Cisco DCNM Fundamentals Guide
Cisco DCNM Fundamentals Guide
c o m
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco DCNM Fundamentals Guide, Release 6.x 2010 Cisco Systems, Inc. All rights reserved.
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CONTENTS
New and Changed Information Preface
lxi lxix xxvii
PART
CHAPTER
Cisco DCNM Fundamentals Overview 1-1 DCNM-SAN Server 1-1 DCNM-SAN Client 1-1 Device Manager 1-2 DCNM-SAN Web Client 1-2 Performance Manager 1-3 Authentication in DCNM-SAN Client 1-3 Cisco Traffic Analyzer 1-3 Network Monitoring 1-4 Performance Monitoring 1-4 Cisco DCNM Web Client
2-5
CHAPTER
Information About Cisco DCNM Web Client 2-5 Downloading Cisco DCNM-SAN Client 2-6 Launching DCNM Web Client 2-7 Adding a Security Exception 2-8 Cisco DCNM Web Client GUI 2-8 Navigating DCNM Web Client 2-10 Using DCNM Web Client with SSL 2-11 Creating a Local Certificate 2-11 Creating a Certificate Singing Request 2-12 Modifying DCNM Web Client to Use SSL 2-13 Viewing Hosts Information 2-14 Viewing Health Information 2-14 Viewing Accounting Information 2-14 Viewing Events Information 2-15 Viewing Syslog Information 2-15 Viewing Syslog Archives Information 2-15
Cisco DCNM Fundamentals Guide, Release 6.x OL-25174-02
iii
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Viewing Performance Information 2-16 Viewing Switch CPU Information 2-17 Viewing Switch Memory Information 2-17 Viewing Switch Bandwidth and Errors Information 2-17 Viewing ISL Traffic and Errors Information 2-18 Viewing Performance Information on All the Ports 2-18 Viewing Performance Information on Host Ports 2-19 Viewing Performance Information on Storage Ports 2-19 Viewing Performance Information on Host Enclosures 2-19 Viewing Performance Information on Storage Enclosures 2-20 Viewing Performance Information on Port Groups 2-20 Viewing Performance Information for ISLs 2-21 Viewing Performance Information for NPV Links 2-21 Viewing Performance Information for Flows 2-22 Viewing Performance Information for Gigabit Ethernet and Ethernet Ports Viewing Other Statistics 2-23 Viewing Inventory Information 2-24 Viewing Inventory Information for VSANs 2-24 Viewing Inventory Information for Switches 2-25 Viewing License Information 2-25 Viewing Inventory Information for Modules 2-26 Viewing Inventory Information for All Ports on End Devices 2-26 Viewing Inventory Information for Host Ports on End Devices 2-26 Viewing Inventory Information for Storage Ports on End Devices 2-27 Viewing Detailed Information for ISLs 2-27 Viewing Inventory Information for NPV Links 2-28 Viewing Inventory Information for Regular Zones 2-28 Viewing Inventory Information for IVR Zones 2-28 Port Mapping 2-29 Viewing the Port Mapper 2-29 Viewing and Creating Custom Reports 2-30 Creating a Custom Report Template 2-31 Viewing a Custom Report Based on a Specific Template 2-33 Viewing a Custom Reports by a Specific User 2-33 Deleting a Report Template 2-33 Generating a Custom Report Based on a Template 2-34 Modifying a Custom Report Template 2-35 Deleting a Custom Report 2-35 Viewing Scheduled Jobs Based on a Report Template 2-35
2-23
iv
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Administering DCNM Web Client 2-36 Starting, Restarting, and Stopping Services 2-37 Adding, Editing, and Removing Managed Fabrics 2-37 Discovering Devices Using Common LAN Discovery 2-38 Discovering a Cisco Device 2-39 Rediscovering a Device 2-40 Managing a LAN 2-41 Removing a LAN 2-41 Modifying a LAN 2-41 Viewing a vPC 2-42 Viewing vPC Inconsistencies 2-43 Resolving vPC Inconsistencies 2-43 Automatically Resolving vPC Inconsistencies 2-44 Viewing the vPC Utilization and Traffic Distribution 2-44 Searching a Device 2-47 Adding, Editing, and Removing VMware Servers 2-49 Managing a VMware Server 2-49 Removing a VMware Server 2-49 Modifying a VMware Server 2-49 Rediscovering a VMware Server 2-50 Adding and Removing Communities 2-50 Adding a Community Fabric 2-50 Removing a Community 2-50 Viewing Log Information 2-51 Configuring Cisco DCNM-SAN Server Properties 2-51 Configuring SFTP Credentials 2-51 Viewing Events and syslogs 2-52 Viewing the Accounting Events 2-52 Viewing the Events and Syslogs 2-52 Viewing Traps and Syslog Registration Information 2-53 Configuring Forwarding of Notifications for Events 2-53 Adding Notification Forwarding 2-53 Adding Notification Forwarding 2-54 Configuring EMC CallHome 2-54 Configuring AAA Properties 2-55 Adding and Removing Users 2-55 Removing a User 2-55 Adding and Removing Roles 2-56 Adding a Role 2-56 Removing a Role 2-56
Cisco DCNM Fundamentals Guide, Release 6.x OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Configuring LDAP for Remote AAA Server 2-56 LDAP Configuration for a Remote AAA Server 2-56 Viewing and Disconnecting Clients 2-58 Creating, Editing, and Removing Performance Collections Adding a Collection 2-59 Removing a Collection 2-59 Viewing the Performance Manager Collection 2-60 Configuring the RRD Database 2-61 Importing the RRD Statistics Index 2-62 Configuring Collection Thresholds 2-62 Configuring Other Statistics 2-63 Cisco DCNM Web Client Admin Group Scope 2-63 Adding Switch Groups 2-64 Adding a Member to a Group 2-66 Moving a Member 2-67 Renaming a Group 2-67 Deleting a Group or a Member of a Group 2-68 Cisco DCNM-SAN Web Search Engine 2-68 Using the Cisco DCNM-SAN Search Engine Configuring Backups Using DCNM Web Client Viewing a Configuration 2-69 Editing a Configuration 2-70 Deleting a Configuration 2-70 Copying a Configuration 2-71 Comparing Configurations 2-71 Creating Backups 2-71 Viewing Scheduled Jobs 2-72
2-68 2-69
2-59
Viewing Hosts and Virtual Hosts Information 2-72 Viewing Host Enclosures 2-72 Viewing Virtual Hosts 2-73 Viewing Virtual Machines 2-73 Viewing CPU and Memory Information of the Virtual Machines Viewing Disc I/O Information of the Virtual Machines 2-73 Viewing End Hosts 2-74 Viewing the End Hosts Summary 2-74 Troubleshooting Host Tracking 2-76 Viewing Dashboard Summary Information 2-77 Viewing Health Summary Information 2-77 Viewing Performance Summary Information 2-77
Cisco DCNM Fundamentals Guide, Release 6.x
2-73
vi
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Viewing Inventory Summary Information Viewing Switch Information 2-78
2
2-78
PART
CHAPTER
3-1 3-1
3-2
Installing and Configuring Cisco DCNM-SAN Server 3-2 Installing Cisco DCNM-SAN Server 3-3 Data Migration in Cisco DCNM-SAN Server 3-5 Verifying Performance Manager Collections 3-5 Managing a Cisco DCNM-SAN Server Fabric 3-6 Selecting a Fabric to Manage Continuously 3-6 Cisco DCNM-SAN Server Properties File 3-6 Modifying Cisco DCNM-SAN Server 3-8 Adding or Removing Cisco DCNM-SAN Server Users 3-8 Changing the Cisco DCNM-SAN Server Username and Password 3-9 Changing the DCNM-SAN Server Fabric Discovery Username and Password Changing the Polling Period and Fabric Rediscovery Time 3-9 Changing the IP Address of the Cisco DCNM-SAN Server 3-10 Using Device Aliases or FC Aliases 3-10 Server Federation 3-11 Restrictions 3-11 Mapping Fabric ID to Server ID 3-11 Opening the Fabric on a Different Server 3-12 Viewing the Sessions in a Federation 3-12 Viewing the Servers in a Federation 3-12 Additional References
4
3-13
3-9
CHAPTER
Configuring Authentication in Cisco DCNM-SAN Information About Cisco DCNM-SAN Authentication Best Practices for Discovering a Fabric 4-3 Setting Up Discovery for a Fabric 4-3 Performance Manager Authentication
4-4 4-4
4-1 4-1
vii
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CHAPTER
5-1
Information About DCNM-SAN Client 5-1 Cisco DCNM-SAN Advanced Mode 5-2 Cisco DCNM-SAN Client Quick Tour: Server Admin Perspective Cisco DCNM-SAN Main Window 5-2 Menu Bar 5-4 Tool Bar 5-4 Logical Domains Pane 5-4 Physical Attributes Pane 5-4 Information Pane 5-5 Fabric Pane 5-6 Cisco DCNM-SAN Client Quick Tour: Admin Perspective Menu Bar 5-8 File 5-8 View 5-9 Zone 5-9 Tools 5-10 Performance 5-12 Server 5-12 Help 5-12 Toolbar 5-12 Logical Domains Pane 5-14 Filtering 5-15 Physical Attributes Pane 5-15 Context Menu for Tables 5-15 Information Pane 5-18 Detachable Tables 5-19 Fabric Pane 5-19 Context Menus 5-22 Saving the Map 5-22 Purging Down Elements 5-22 Multiple Fabric Display 5-23 Filtering by Groups 5-23 Status Bar 5-24
5-7 5-2
Launching Cisco DCNM-SAN Client 5-24 Launching Fabric Manager Client in Cisco SAN-OS Release 3.2(1) and Later Launching Cisco DCNM-SAN Client Using Launch Pad 5-27 Setting Cisco DCNM-SAN Preferences Network Fabric Discovery
Cisco DCNM Fundamentals Guide, Release 6.x
5-24
5-28
5-30
viii
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Network LAN Discovery 5-30 Viewing Ethernet Switches Removing a LAN 5-30
5-30
Modifying the Device Grouping 5-31 Using Alias Names as Enclosures 5-31 Using Alias Names as Descriptions 5-32 Controlling Administrator Access with Users and Roles Using Cisco DCNM-SAN Wizards
5-32 5-33 5-34 5-32
Integrating Cisco DCNM-SAN and Data Center Network Management Software Launching a Switch from the Topology Map 5-34
6
CHAPTER
Device Manager
6-1
Information About Device Manager 6-1 Device Manager Features 6-2 Using Device Manager Interface 6-2 Menu Bar 6-3 Toolbar Icons 6-4 Dialog Boxes 6-5 Tabs 6-6 Legend 6-6 Supervisor and Switching Modules 6-8 Context Menus 6-8 Launching Device Manager
6-8 6-10
CHAPTER
7-1 7-1
Information About Performance Manager Data Interpolation 7-2 Data Collection 7-2 Using Performance Thresholds 7-2 Flow Statistics
7-3
Flow Setup Wizards 7-4 Creating a Flow Using Performance Manager Flow Wizard
7-5
7-4
CHAPTER
8-1 8-1
ix
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Monitoring Health and Events 8-1 DCNM-SAN Events Tab 8-2 Event Information in DCNM-SAN Web Server Reports 8-2 Events in Device Manager 8-2 SAN Discovery and Topology Mapping 8-2 Device Discovery 8-2 Topology Mapping 8-3 Using the Topology Map 8-3 Saving a Customized Topology Map Layout 8-3 Using Enclosures with DCNM-SAN Topology Maps 8-3 Mapping Multiple Fabrics 8-4 Inventory Management 8-4 Using the Inventory Tab from DCNM-SAN Web Server 8-4 Viewing Logs from Device Manager 8-4
8-5
CHAPTER
Monitoring Performance
9-1
Information About Performance Monitoring 9-1 Real-Time Performance Monitoring 9-1 Historical Performance Monitoring 9-2 Configuring Performance Manager 9-2 Creating a Flow with Performance Manager 9-2 Creating a Collection with Performance Manager 9-2 Using Performance Thresholds 9-3 Configuring the Summary View in Device Manager
9-4 9-4
Displaying DCNM-SAN Real-Time ISL Statistics 9-5 Using the Performance Manager Configuration Wizard Viewing Performance Statics Using DCNM-SAN 9-6
9-6
Displaying Performance Manager Reports 9-6 Displaying Performance Summary 9-7 Displaying Performance Tables and Details Graphs 9-7 Displaying Performance of Host-Optimized Port Groups 9-7 Displaying Performance Manager Events 9-7 Generating Performance Manager Reports 9-8 Generating Top10 Reports in Performance Manager 9-8 Generating Top10 Reports Using Scripts 9-8 Configuring Performance Manager for Use with Cisco Traffic Analyzer Exporting Data Collections
Cisco DCNM Fundamentals Guide, Release 6.x
9-9
9-11
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Exporting Data Collections to XML Files 9-11 Exporting Data Collections in Readable Format Analyzing SAN Health 9-12 Installing the SAN Health Advisor Tool
10
9-13
9-11
CHAPTER
Software Images
10-1
Information About Software Images 10-1 Software Upgrade Methods 10-2 Determining Software Compatibility 10-2 Automated Upgrades 10-3 Benefits of Using the Software Install Wizard Recognizing Failure Cases 10-4
10-3
Prerequisites for Installing Software Images 10-4 Selecting the Correct Software Images for Cisco MDS 9100 Series Switches Selecting the Correct Software Images for Cisco MDS 9200 Series Switches Selecting the Correct Software Images for Cisco MDS 9500 Family Switches Essential Upgrade Prerequisites 10-6 Default Settings
10-8
Using the Software Install Wizard 10-8 Upgrading Services Modules 10-10 Performing Nondisruptive Upgrades on Fabric and Modular Switches 10-11 Preparing for a Nondisruptive Upgrade on Fabric and Modular Switches 10-11 Performing a Nondisruptive Upgrade on a Fabric Switch 10-12 Maintaining Supervisor Modules 10-12 Replacing Supervisor Modules 10-12 Migrating from Supervisor-1 Modules to Supervisor-2 Modules 10-13 Setting Standby Supervisor Module Boot Variable Version 10-13 Setting Standby Supervisor Module Bootflash Memory 10-13 Standby Supervisor Module Boot Alert 10-14 Installing Generation 2 Modules in Generation 1 Chassis Replacing Modules
10-15 10-14 10-14
CHAPTER
11
11-1
Installation Issues 11-3 When installing Cisco DCNM-SAN from windows, why does clicking install fail? Why do I have trouble launching Cisco DCNM-SAN on Solaris? 11-3 What do I do if my browser prompts to save JNLP files? 11-3
11-3
xi
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
What do I do if I see a "Java Web Start not detected" error? 11-4 How do I upgrade to a newer version of Cisco DCNM-SAN or Device Manager? 11-4 How do I downgrade Cisco DCNM-SAN or Device Manager? 11-4 What do I do if an upgrade is not working? 11-4 What do I do if Java Web Start hangs on the download dialog? 11-4 How do I manually configure a browser for Java Web Start? 11-5 How do I run Java Web Start from the command line? 11-5 How do I clear the Java Web Start cache? 11-5 What do I do if during a Cisco DCNM-SAN upgrade, the installer doesnt display a prompt to create a shortcut? 11-6 What do I do if my login does not work in Cisco DCNM-SAN or Device Manager? 11-6 What do I do if I cannot install Cisco DCNM-SAN or Device Manager, or run Java, when pcAnyWhere is running? 11-6 What do I do if the Cisco DCNM-SAN or Performance Manager service shows up as disabled in the Services menu? 11-6 What do I do if I am unable to install Cisco DCNM-SAN or Device Manager, or run Java, when McAfee Internet Suite 6.0 Professional is running? 11-7 General 11-7 What do I do if I see errors while monitoring Area chart graphing? 11-7 What do I do if I see "gen error" messages? 11-7 What do I do if disk images in the Device Manager Summary View are not visible? 11-7 What do I do if I am unable to set both the D_S_TOV and E_D_TOV timers in Device Manager? 11-7 What do I do if columns in Device Manager tables are too small? 11-8 What do I do if fabric changes are not propagated onto the map (for example, links don't disappear)? 11-8 What do I do if the PortChannel creation dialog becomes too small after several uses? 11-8 What do I do if I see errors after IPFC configuration? 11-8 What do I do if Cisco DCNM-SAN or Device Manager is using the wrong network interface? 11-8 What do I do if I see display anomalies in Cisco DCNM-SAN or Device Manager? 11-9 What do I do if most of my Physical Attributes catagories disappear? 11-9 What do I do if I cant see the Information pane? 11-9 Why is the active zone set in edit zone always shown in bold (even after successful activation)? 11-9 Can I create a zone with prefix IVRZ or a zone set with name nozonset? 11-9 What do I do when One-Click License Install fails, and I cannot connect to the Cisco website? 11-9 How do I increase the log window size in Cisco DCNM-SAN Client? 11-10 When do I do when the FM Server Database fails to start or has a file locking error? 11-10 How do I re-synchronize Cisco DCNM-SAN Client with Cisco DCNM-SAN Server? 11-10 How do I rediscover the current fabric? 11-10 How do I rediscover SCSI Targets? 11-10 Windows Issues
11-10
xii
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
What do I do when text fields show up too small, and I cannot enter any data? 11-10 What do I do when printing causes an application crash? 11-11 What do I do when Windows XP hangs (or I see a blue screen)? 11-11 What do I do when Cisco DCNM-SAN and Device Manager Icons Disappear? 11-11 What do I do when Device Manager or Cisco DCNM-SAN window content disappears in Windows XP? 11-11 What do I do when SCP/SFTP fails when a file is copied from local machine to the switch? 11-11 UNIX Issues 11-12 What do I do when the parent Menus Disappear? 11-12 What do I do when the web browser cannot find web server even it is running? How do I fix a "too many open files" error? 11-12
11-12
Other 11-13 How do I set the map layout so it stays after Cisco DCNM-SAN restarted? 11-13 What do I do when two switches show on the map, but there is only one switch? 11-13 What does a red/orange/dotted line through the switch mean? 11-13 How do I upgrade without losing map settings? 11-19 How do I preserve historical data when moving Cisco DCNM-SAN server to new host? 11-19 Are there restrictions when using Cisco DCNM-SAN across FCIP? 11-19 How do I fix a "Please insure that FM server is running on localhost" message? 11-20 How do I run Cisco DCNM-SAN with multiple interfaces? 11-20 Manually specifying an interface for Cisco DCNM-SAN Server 11-21 Manually specifying an interface for Cisco DCNM-SAN Client or Device Manager 11-21 How do I configure an HTTP proxy server? 11-21 How do I clear the topology map? 11-22 How can I use Cisco DCNM-SAN in a mixed software environment? 11-22 How do I fix a "corrupted jar file" error when Launching Cisco DCNM-SAN? 11-22 How do I search for Devices in a Fabric? 11-23 How do I search in a table? 11-23 How do I manage Multiple Fabrics? 11-24 How can I clear an Orange X Through a Switch caused by license expiration? 11-24
3
PART
CHAPTER
Overview of DCNM-LAN
xiii
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CHAPTER
13
Information About Installing and Launching the DCNM-LAN Client Prerequisites for Installing and Launching the DCNM-LAN Client Secure Client Communications
13-2 13-3
Downloading and Launching the DCNM-LAN Client 13-3 Using a Web Browser to Download and Launch the DCNM-LAN Client 13-3 Using a Command Prompt to Download and Launch the DCNM-LAN Client 13-5 Using a Command Prompt to Download and Launch the DCNM-LAN Client without using Java Web Start Launcher 13-6 Restarting the DCNM-LAN Client Logging Into the DCNM-LAN Client Uninstalling the DCNM-LAN Client Additional References 13-9 Related Documents 13-9 Standards 13-9 Feature History for Installing and Launching the DCNM-LAN Client
14
13-10 13-7 13-7 13-8
CHAPTER
14-1 14-1
Information About the DCNM-LAN Client User Interface 14-2 Feature Selector Pane 14-2 Contents Pane 14-3 Summary Pane 14-3 Details Pane 14-3 Association Pane 14-4 Menus 14-5 Toolbars 14-6 Keyboard Commands 14-7 Multiple Platform Support 14-7 Opening the DCNM-LAN Client Closing the DCNM-LAN Client Deploying Changes
14-10 14-8 14-9
Working with Statistics and Charts 14-10 Information about Statistics and Charts 14-11 Licensing Requirements for Statistics and Charts 14-11 Accessing a Chart 14-11 Starting Statistical Monitoring for a Chart 14-12
Cisco DCNM Fundamentals Guide, Release 6.x
xiv
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Stopping Statistical Monitoring for a Chart Using a Chart 14-13 Using an Overview Chart 14-14 Exporting a Chart 14-15
14-12
Configuring Global Preferences 14-15 Configuring Monitoring Preferences 14-16 Configuring the Maximum Age of Events Fetched from the Server Configuring Preprovisioning 14-17 Using Online Help
14-18
14-16
Additional References 14-18 Related Documents 14-18 Standards 14-19 Feature History for Using the DCNM-LAN Client
15
14-19
CHAPTER
15-1 15-1
Information About Administering DCNM-LAN Authentication Settings Users and User Roles 15-2 Local Authentication and DCNM-LAN Local Users 15-2 RADIUS and TACACS+ Authentication 15-2 User Role Assignment by RADIUS and TACACS+ 15-3 Fallback to Local Authentication 15-3 Password Recovery 15-3 Users and Device Credentials 15-4 Virtualization Support 15-4 Prerequisites for Administering DCNM-LAN Authentication Settings
15-4
Guidelines and Limitations for Administering DCNM-LAN Authentication Settings Configuring DCNM-LAN Authentication Settings 15-5 Configuring the Authentication Mode 15-5 Adding a DCNM-LAN Local User 15-6 Changing the Password of a DCNM-LAN Local User 15-7 Changing the Full Name, Role, or Description of a DCNM-LAN Local User Deleting a DCNM-LAN Server User 15-8 Adding Authentication Servers 15-9 Changing Authentication Server Settings 15-10 Removing an Authentication Server 15-11 Viewing DCNM-LAN Local Users
15-12 15-12
15-5
15-8
xv
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Field Descriptions for DCNM-LAN Authentication Settings Authentication Mode Section 15-13 DCNM-LAN Local Users Section 15-13 Authentication Servers Section 15-14 Additional References 15-14 Related Documents 15-15 Standards 15-15 Feature History for DCNM-LAN Authentication Settings
16
15-15 15-13
CHAPTER
16-1
Information About Device Discovery 16-1 Device Discovery 16-2 Discovery Protocols 16-2 Cisco Discovery Protocol 16-2 Link Layer Discovery Protocol 16-3 Fibre Channel 16-3 Credentials and Discovery 16-3 Discovery Process 16-3 Cisco NX-OS System-Message Logging Requirements 16-4 Interface Link-Status Events Logging Requirement 16-4 Logfile Requirements 16-4 Logging Severity-Level Requirements 16-4 Automatic Logging-Level Configuration Support 16-5 During Device Discovery 16-5 At Feature Enablement in the DCNM-LAN Client 16-5 During Auto-Synchronization with Managed Devices 16-5 VDC Support 16-5 Licensing Requirements for Device Discovery Prerequisites for Device Discovery
16-7 16-7 16-6
Performing Device Discovery 16-8 Verifying the Discovery Readiness of a Cisco NX-OS Device Discovering Devices 16-10 Rediscovering Devices 16-11 Viewing the Status of Device Discovery Tasks Where to Go Next
16-12 16-12
16-8
Field Descriptions for Device Discovery 16-13 Device Discovery Content Pane 16-13
xvi
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Related Fields
16-14
Device System-Message Logging Level Reference 16-14 Cisco Nexus 7000 NX-OS Logging Levels per DCNM-LAN Feature 16-15 Cisco Nexus 5000 NX-OS Logging Levels per DCNM-LAN Feature 16-16 Cisco Nexus 4000 NX-OS Logging Levels per DCNM-LAN Feature 16-17 Cisco Nexus 1000V NX-OS Logging Levels per DCNM-LAN Feature 16-18 Additional References for Device Discovery Related Documents 16-18 Standards 16-19 Feature History for Device Discovery
17
16-19 16-18
CHAPTER
17-1 17-1
Information About Devices and Credentials Devices 17-1 Credentials 17-2 Device Status 17-2 VDC Support 17-2
Licensing Requirements for Devices and Credentials Guidelines and Limitations for Devices and Credentials
Prerequisites for Administering Devices and Credentials Configuring Devices and Credentials 17-3 Adding a Device 17-3 Discovering a Device 17-4 Unmanaging a Device 17-5 Deleting a Device 17-5 Configuring Default Device Credentials 17-6 Clearing Default Device Credentials 17-7 Configuring Unique Credentials for a Device 17-7 Clearing Unique Credentials for a Device 17-8 Viewing Device Credentials and Status
17-9
Field Descriptions for Devices and Credentials 17-10 Device and Credentials Content Pane 17-10 Additional References for Devices and Credentials Related Documents 17-11 Standards 17-11 Feature History for Devices and Credentials
17-11 17-11
xvii
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CHAPTER
18
Licensing Requirements for Administering DCNM-LAN Licensed Devices Prerequisites for Administering DCNM-LAN Licensed Devices Configuring DCNM-LAN Licensed Devices 18-2 Adding Devices to the Licensed Devices List 18-3 Removing Devices from the Licensed Devices List 18-3 Viewing DCNM-LAN Licensed Devices
18-4 18-2
18-2
Field Descriptions for DCNM-LAN Licensed Devices 18-4 DCNM-LAN Licensed Devices Content Pane 18-4 Additional References 18-5 Related Documents 18-5 Standards 18-5 Feature History for DCNM-LAN Licensed Devices
19
18-5
CHAPTER
19-1
Information About Topology 19-1 Map Views 19-2 Physical View 19-2 PortChannel and vPC 19-3 Logical vPC View 19-4 L2 View 19-5 Layouts 19-5 vPC Support 19-6 DCNM-SAN Support 19-6 Common Topology 19-6 Access to DCNM-SAN Features FabricPath Support 19-6 Device Groups 19-7 Network Servers 19-7 Licensing Requirements for Topology Prerequisites for Topology Guidelines and Limitations
19-8 19-8 19-8
19-6
Using the Topology Feature 19-8 Opening the Topology Map 19-9 Understanding Device Icons and Links Using the Viewing Tools 19-12
Cisco DCNM Fundamentals Guide, Release 6.x
19-10
xviii
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Showing, Hiding, and Using the Details Pane 19-13 Moving Devices in the Topology Map 19-14 Loading a Layout 19-15 Reloading the Previously Saved Layout 19-16 Showing a Virtual or Physical Chassis 19-16 Showing or Hiding Network Servers 19-17 Managing a Network Server 19-17 Showing or Hiding Device Groups 19-18 Expanding or Collapsing Device Groups 19-18 Creating a Device Group 19-19 Moving a Device Between Device Groups 19-19 Removing a Device from a Device Group 19-20 Copy Run to Start 19-21 Deleting a Device Group 19-22 Exporting the Topology as a JPG Image 19-22 Accessing DCNM-LAN Features from the Topology Map 19-23 Accessing Cisco DCNM-SAN Features from the Topology Map 19-24 Accessing Cisco FabricPath Features from the Topology Map 19-25 Multi-destination 19-25 Device Reachability 19-25 Unicast 19-26 Multicast 19-27 Launching the vPC Wizard 19-28 Managing a vPC 19-28 Finding and Resolving vPC Configuration Inconsistencies 19-29 Accessing Remotely Connected CNAs from the Topology Map 19-29 Using VSAN Overlay 19-30 Related Documents
19-30 19-31
CHAPTER
20-1
Information About Network Servers 20-1 Automatic Correlation of Adapters to Servers 20-2 Manual Correlation of Adapters to Servers 20-2 Licensing Requirements for Network Servers Prerequisites for Network Servers
20-3 20-3 20-2
Guidelines and Limitations for Network Servers Configuring Network Servers 20-3 Configuring Default Server Credentials
20-4
xix
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Clearing Default Server Credentials 20-4 Configuring Unique Credentials for a Server 20-5 Clearing Unique Credentials for a Server 20-6 Correlating Servers 20-6 Correlating a Server to Adapters Automatically 20-9 Binding Adapters to a Server Manually 20-10 Unbinding an Adapter from a Server 20-10 Viewing Server Connectivity Information
20-11
Field Descriptions for Network Servers 20-11 Field Descriptions for Servers 20-11 Servers Summary Pane 20-12 Server: Server Details: LAN Connectivity Section Server: Server Details: SAN Connectivity Section Field Descriptions for Static Server-Adapter Mapping Field Descriptions for Server Credentials 20-13 Additional References 20-14 Related Documents 20-14 Standards 20-14 Feature History for Network Servers
21
20-15
CHAPTER
Guidelines and Limitations for Device Groups Configuring Device Groups 21-2 Creating a Device Group 21-2 Adding Devices to a Group 21-4 Removing Devices from a Group 21-5 Deleting a Device Group 21-5 Where to Go Next
21-6
21-2
Field Descriptions for Device Groups 21-6 Summary Pane 21-6 Device Group: Details: Global Settings Section 21-7 Device Group: Details: Membership Details Section 21-7 Additional References 21-7 Related Documents 21-7 Standards 21-7
Cisco DCNM Fundamentals Guide, Release 6.x
xx
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Feature History for Device Groups
22
21-8
CHAPTER
22-1
Information About Cluster Administration 22-1 Cluster Administration 22-1 Clustered-Server Environment 22-2 Master Server Role 22-2 Distributed Server Tasks 22-2 Effect of Cluster Changes on Server Task Distribution Licensing Requirements for Cluster Administration Prerequisites for Cluster Administration Viewing Server Information
22-4 22-5 22-4 22-4 22-4
22-3
Guidelines and Limitations for Cluster Administration Field Descriptions for Cluster Administration Summary Pane 22-5 Server: Details Tab 22-5 Additional References 22-6 Related Documents 22-6 Standards 22-6 Feature History for Cluster Administration
23
22-6
CHAPTER
23-1
Information About Auto-Synchronization with Devices 23-1 Automatic and Manual Purging of Event Data 23-2 Virtualization Support 23-2 Licensing Requirements for Auto-Synchronization with Devices Prerequisites for Auto-Synchronization with Devices
23-2 23-3 23-2
Guidelines and Limitations for Auto-Synchronization with Devices Configuring Device Auto-Synchronization 23-3 Starting and Stopping a Poller 23-3 Configuring the Polling Interval 23-4 Synchronizing with a Device 23-4 Deleting Data from the Events Database 23-5 Enabling and Disabling Automatic Event Purging 23-6 Configuring Automatic Event Purge Settings 23-6 Purging Events Now 23-8 Viewing the Status of Auto-Synchronization Pollers
23-8 23-9
xxi
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Poller Setting Tab 23-9 Events Database Administration Tab Additional References 23-10 Related Documents 23-10 Standards 23-11 Feature History for Auto-Synchronization with Devices
24
23-11
23-9
CHAPTER
24-1
Information About Threshold Rules 24-1 Threshold Rules Overview 24-1 Rising Threshold 24-2 Falling Threshold 24-2 Threshold Rule Properties 24-2 Threshold Rule Actions 24-2 Threshold Rule Examples 24-2 Triggering an Action Each Time a Threshold is Crossed 24-2 Triggering an Action Only Once in a Period When a Threshold is Crossed 24-3 Triggering an Action Every Fourth Period When a Threshold is Crossed 24-4 Licensing Requirements for Threshold Rules Configuring Threshold Rules 24-5 Creating Threshold Rules 24-5 Deleting Threshold Rules 24-7 Editing Threshold Rules 24-7 Viewing Threshold Rules 24-8 Applying a Threshold Rule to a Chart Additional References 24-8 Related Documents 24-8 Standards 24-9 Feature History for Threshold Rules
25
24-9 24-5
24-8
CHAPTER
25-1
Information About Statistical Data Collection 25-1 Automatic and Manual Purging of Statistical Data Virtualization Support 25-2 Licensing Requirements for Statistical Data Collection Prerequisites for Statistical Data Collection Configuring Statistical Data Collection
Cisco DCNM Fundamentals Guide, Release 6.x
25-2
25-2
25-2 25-3
xxii
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Starting and Stopping Statistical Data Collection 25-3 Using Modes in Statistics Charts 25-4 Deleting Statistical Data from a Collection 25-5 Deleting a Collection 25-5 Deleting Data from the Statistics Database 25-6 Enabling and Disabling Automatic Statistical Data Purging 25-6 Configuring Automatic Statistical Data Purge Settings 25-7 Purging Statistical Data Now 25-8 Viewing the Status of Statistical Data Collectors
25-9
Field Descriptions for Statistical Data Collection 25-9 Summary Pane 25-9 Statistical Database Administration Tab 25-10 Additional References 25-11 Related Documents 25-11 Standards 25-11 Feature History for Statistical Data Collection
26
25-11
CHAPTER
Guidelines and Limitations for Network Analysis Using the Network Analysis Feature 26-2 Using Network Analysis 26-2 Using the New Path Latency Session Wizard Viewing Session Statistics 26-7 Related Documents
26-8 26-8
26-2
26-4
CHAPTER
27-1 27-1
Information About Administering DCNM-LAN Server Log Settings Logging Levels 27-2 Log File and Location 27-2 Virtualization Support 27-2 Prerequisites for Administering DCNM-LAN Server Log Settings Configuring DCNM-LAN Server Log Settings
27-3
27-2
27-3
xxiii
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Configuring the Default Logging Level 27-3 Configuring a Unique Logging Level for a Feature or Server Component 27-3 Configuring a Feature or Server Component to Use the Default Logging Level 27-4 Viewing DCNM-LAN Server Log Settings
27-4
Field Descriptions for DCNM-LAN Server Log Settings 27-5 DCNM-LAN Server Log Settings Contents Pane 27-5 Additional References 27-6 Related Documents 27-6 Standards 27-6 Feature History for DCNM-LAN Server Log Settings
28
27-7
CHAPTER
Licensing Requirements for Starting and Stopping Cisco DCNM-LAN Servers Starting DCNM-LAN Servers 28-2 Starting a Single DCNM-LAN Server 28-2 Starting a Single DCNM-LAN Server (Microsoft Windows Server) Starting a Single DCNM-LAN Server (RHEL) 28-2 Starting a Cluster of DCNM-LAN Servers 28-3 Starting with Windows GUI or RHEL CLI 28-3 Starting with Install Manager 28-4 Stopping DCNM-LAN Servers 28-5 Stopping Single DCNM-LAN Servers 28-5 Stopping a Single DCNM-LAN Server (Microsoft Windows Server) Stopping a Single DCNM-LAN Server (RHEL) 28-6 Stopping a Cluster of DCNM-LAN Servers 28-6 Stopping with CLI 28-6 Example 28-7 Stopping with Install Manager 28-7 Related Documents
28-8 28-9
28-2
28-5
CHAPTER
29-1
Information About Database Maintenance 29-1 Automatic and Manual Purging of Data 29-1 Database Backup 29-2 Database Clean 29-2 Database Restore 29-2
xxiv
OL-25174-02
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Licensing Requirements for Database Maintenance Prerequisites for Database Maintenance
29-3 29-3 29-3
Performing Database Maintenance 29-4 Backing Up the DCNM-LAN Database 29-4 Cleaning a DCNM-LAN Database 29-5 Restoring a DCNM-LAN Database from a Backup File Additional References 29-9 Related Documents 29-9 Standards 29-9 Feature History for DCNM-LAN Database Maintenance
30
29-7
29-9
CHAPTER
Troubleshooting DCNM-LAN
30-1
Tips for Using DCNM-LAN 30-1 Events Tabs Show Fewer Events than the Event Browser 30-1 Event Browser Pie Chart May Be Inaccurate for Small Numbers Trouble with Starting the DCNM-LAN Server DCNM-LAN Server Fails to Start 30-2
30-2
30-2
Trouble with the DCNM-LAN Database 30-3 Trouble with a PostgreSQL Database 30-3 Updating DCNM-LAN Database Name and Username in pgAdmin III Trouble with an Oracle Database 30-4 Trouble with the DCNM-LAN Client 30-5 Cannot Download the DCNM-LAN Client from the Server 30-6 Cannot Install the DCNM-LAN Client 30-6 Cannot Start the DCNM-LAN Client 30-7 Cannot Log into the DCNM-LAN Client 30-8 Client Loses Connection to the DCNM-LAN Server 30-10 Trouble with Device Discovery or Device Status Trouble with Device Management Trouble with Topology
30-12 30-13 30-12 30-11
30-3
PART
Appendices Launching Fabric Manager in Cisco SAN-OS Releases Prior to 3.2(1) Setting the Seed Switch in Cisco SAN-OS Releases 3.1(1) to 3.2(1)
A-1 A-1
xxv
Contents
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Setting the Seed Switch in Releases Prior to Cisco SAN-OS Release 3.1(1) Cisco DCNM Unsupported Feature List Interface Nonoperational Reason Codes Managing Cisco FabricWare Fibre Channel Support Zone Configuration Security Events
D-2 D-2 D-3 D-1 D-1 D-1 B-1 C-1 A-3
xxvi
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Feature
Where Documented Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client
Templates Configuration Configuring vPC, FCoE and FIP templates Common LAN Discovery Host Dashboard Summary Dashboard Discover various Cisco devices from a sngle interface. Information about SAN and virtual hosts.
Details about Datacenter 6.1(2) switches, selected SAN and LAN switches, or a group of LAN and SAN switches. Monitor MDS switch events, performance and memory from a remote location Generate the Web client page report Searching a LAN or SAN device by its name, IP address, world wide name (WWN), alias, or serial number. 6.1(1a)
Configuration Archive Web Client Page Report Web Client Page Enhanced Search Capabilty
Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client
6.1(1a) 6.1(1a)
Viewing all events and syslogs on 6.1(1a) the Events window. Configuring switch groups Tracking end hosts and screens 6.1(1a) 6.1(1a)
Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client
xxvii
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 1 New and Changed Features for Cisco DCNM Release 6.x (continued)
Feature Improved Cisco Prime Look and Feel Performace Manager Collection Port Mapper Remote AAA LDAP Configuration vPC Inconsistency vPC Utilization and Traffic Distribution Device Discovery Summary Dashboard Hosts Dashboard Integrating FM and DCNM Search Engine Switch Configuration Management SAN Health Analyzer Tool Software Upgrade Wizard Enhancement Web Client Report Enhancement Scoped Discovery Federated Server Cisco Discovery Protocol - FM - DM Enhancements FM Web Client: Report Enhancements
New or Changed Topics Improved look and feel of Cisco DCNM Web Client Viewing Performance Manager collections Viewing the port mapper Configuring LDAP for a remote AAA server Resolving vPC inconsistency Viewing the relationship among vPCs Supports F2 module Viewing Dashboard Summary Information Viewing Hosts and Virtual Hosts Information Integrating Fabric Manager and Data Center Network
Changed in Release 6.1(1a) 6.1(1a) 6.1(1a) 6.1(1a) 6.1(1a) 6.1(1a) 5.2(2a) 5.2(1a) 5.2(1a) 5.0(1)
Where Documented Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 16, Administering Device Discovery Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 5, Configuring Cisco DCNM-SAN Client Chapter 2, Cisco DCNM Web Client Chapter 2, Cisco DCNM Web Client Chapter 9, Monitoring Performance Chapter 10, Software Images Chapter 2, Cisco DCNM Web Client Chapter 5, Configuring Cisco DCNM-SAN Client Chapter 3, Configuring Cisco DCNM-SAN Server Chapter 5, Configuring Cisco DCNM-SAN Client Chapter 2, Cisco DCNM Web Client
Fabric manager Webclient Search 5.0(1) Engine Configuration Backups using Fabric Manager Webclient Analyzing SAN Health 5.0(1) 5.0(1)
Using the Software Install Wizard 5.0(1) Reports VSAN Scoped Discovery Server Federation 5.0(1) 5.0(1) 4.2(1)
4.2(1)
xxviii
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 1 New and Changed Features for Cisco DCNM Release 6.x (continued)
Changed in Release
Where Documented Chapter 5, Configuring Cisco DCNM-SAN Client Chapter 5, Configuring Cisco DCNM-SAN Client Chapter 9, Monitoring Performance
Launching Fabric Manager Client 4.2(1) Using Launch Pad. 4.2(1) 4.2(1)
Populate Device Alias to Using Alias Names as Device Description Descriptions. FM Historical and Real Time Charts Viewing Statics Using Fabric Manager
xxix
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
xxx
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Preface
This preface describes the audience, organization, and conventions of the Cisco DCNM Fundamentals Configuration Guide. It also provides information on how to obtain related documentation.
Audience
This guide is for experienced network administrators who are responsible for configuring and maintaining the Cisco MDS 9000 Family of multilayer directors and fabric switches.
Organization
This guide is organized as follows: Chapter Part 1 Chapter i Chapter 1 Title Cisco Data Center Network Manager Introduction to Cisco Data Center Network Manager Cisco DCNM Fundamentals Overview Cisco DCNM Web Client Cisco DCNM for SAN Configuring Cisco DCNM-SAN Server Configuring Authentication in Cisco DCNM-SAN Configuring Cisco DCNM-SAN Client Device Manager Description Provides information about Cisco DCNM. Provides a brief overview of Cisco DCNM Fundamentals. Provides a brief overview of Cisco DCNM-SAN. Provides in-depth descriptions of GUI and capabilities of Cisco DCNM Web Client. Provides information about Cisco DCNM for SAN. Provides in-depth descriptions of GUI and capabilities of Cisco DCNM-SAN Server. Describes the authentication schemes between Cisco DCNM-SAN components and fabric switches. Provides in-depth descriptions of GUI and capabilities of Cisco DCNM-SAN. Provides in-depth descriptions of GUI and capabilities of Device Manager.
Chapter 5 Chapter 6
lxi
Preface
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Chapter Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Title Configuring Performance Manager Monitoring the Network Monitoring Performance Software Images Management Software FAQ Description Provides overview of the Performance Manager architecture. Provides details on monitoring the network. Provides details on using Performance Manager. Provides details on installing and upgrading software on switches. Provides answers to some of the most frequently asked questions about Cisco Fabric Manager and Device Manager. Provides information about Cisco DCNM for LAN. Provides an overview of what you need to do to start using Cisco Data Center Network Manager for LAN (DCNM-LAN). Describes how to install and set up the Cisco DCNM-LAN client. Introduces the Cisco DCNM-LAN client and explains how to use it. Describes how to administer the Cisco DCNM-LAN server user accounts. Describes how to use the Device Discovery feature. Describes how to use the Devices and Credentials feature.
Part 3 Chapter 12
Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27
Installing and Launching the Cisco DCNM-LAN Client Using the Cisco DCNM-LAN Client Administering DCNM-LAN Authentication Settings Administering Device Discovery Administering Devices and Credentials
Administering DCNM-LAN Licensed Describes how to use the DCNM-LAN Licensed Devices feature. Devices Working with Topology Configuring Network Servers Configuring Device Groups Describes how to use the Topology feature. Describes how to use the Network Servers feature. Describes how to use the Device Groups feature.
Working with Cluster Administration Describes how to use the Cluster Administration feature. Administering Auto-Synchronization Describes how to use the Auto-Synchronization with Devices feature. with Devices Working With Threshold Rules Administering Statistical Data Collection Working with Network Analysis Administering DCNM-LAN Server Log Settings Describes how to configure threshold rules. Describes how to control statistical data collection. Describes how to track and monitor the latency between two specified switches. Describes how to control Cisco DCNM-LAN server logs.
lxii
OL-25174-02
Preface
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Chapter Chapter 28 Chapter 29 Chapter 30 Part 4 Appendix A Title Starting and Stopping Cisco DCNM-LAN Servers Maintaining the Cisco DCNM-LAN Database Troubleshooting DCNM-LAN Appendices Launching Fabric Manager in Cisco SAN-OS Releases Prior to 3.2(1) Cisco DCNM Unsupported Feature List Interface Nonoperational Reason Codes Managing Cisco FabricWare Provides instructions for launching Fabric Manager Client in Cisco SAN-OS releases prior to 3.2(1). Provides a list of features and functions not supported by Cisco Fabric Manager or Device Manager. Provides the nonoperational reason codes for why an interface is up and the operational state is down. Provides information on the Cisco FabricWare software running on the MDS 9020 Switch which offers Fibre Channel switching services that realize maximum performance. Description Describes how to start and stop the Cisco DCNM-LAN server. Describes how to maintain the Cisco DCNM-LAN database. Explains how to resolve problems that you might encounter with Cisco DCNM-LAN.
Appendix B
Appendix C
Appendix D
Document Conventions
Command descriptions use these conventions: boldface font italic font [ ] [x|y|z] Commands and keywords are in boldface. Arguments for which you supply values are in italics. Elements in square brackets are optional. Optional alternative keywords are grouped in brackets and separated by vertical bars.
Terminal sessions and information the switch displays are in screen font. Information you must enter is in boldface screen font. Arguments for which you supply values are in italic screen font. Nonprinting characters, such as passwords, are in angle brackets. Default responses to system prompts are in square brackets. An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line.
lxiii
Preface
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
This document uses the following conventions:
Note
Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Caution
Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. In this document, the following shortened names are used:
Cisco Data Center Network Manager for SAN is also referred to as DCNM-SAN. Cisco Data Center Network Manager for LAN is also referred to as DCNM-LAN.
Related Documentation
This section contains information about the documentation available for Cisco DCNM and for the platforms that Cisco DCNM manages. This section includes the following topics:
Cisco DCNM Documentation, page lxiv Cisco Nexus 1000V Series Switch Documentation, page lxv Cisco Nexus 2000 Series Fabric Extender Documentation, page lxv Cisco Nexus 3000 Series Switch Documentation, page lxv Cisco Nexus 4000 Series Switch Documentation, page lxvi Cisco Nexus 5000 Series Switch Documentation, page lxvi Cisco Nexus 7000 Series Switch Documentation, page lxvi
Release Notes
Cisco DCNM Release Notes, Release 5.x
Cisco DCNM
The following publications support both Cisco DCNM for LAN and DCNM for SAN, and address the new licensing model, the new installation process, and the new features of Cisco DCNM:
lxiv
OL-25174-02
Preface
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
lxv
Preface
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Release Notes
Cisco MDS 9000 Family Release Notes for Cisco MDS NX-OS Releases Cisco MDS 9000 Family Release Notes for MDS SAN-OS Releases Cisco MDS 9000 Family Release Notes for Cisco MDS 9000 EPLD Images
Regulatory Compliance and Safety Information for the Cisco MDS 9000 Family
Compatibility Information
Cisco Data Center Interoperability Support Matrix Cisco MDS 9000 NX-OS Hardware and Software Compatibility Information and Feature Lists Cisco MDS 9000 Family Switch-to-Switch Interoperability Configuration Guide
Hardware Installation
lxvi
OL-25174-02
Preface
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Cisco MDS 9200 Series Hardware Installation Guide Cisco MDS 9100 Series Hardware Installation Guide Cisco MDS 9124 and Cisco MDS 9134 Multilayer Fabric Switch Quick Start Guide
Cisco NX-OS
Cisco MDS 9000 Family NX-OS Licensing Guide Cisco MDS 9000 Family NX-OS Fundamentals Configuration Guide Cisco MDS 9000 Family NX-OS System Management Configuration Guide Cisco MDS 9000 Family NX-OS Interfaces Configuration Guide Cisco MDS 9000 Family NX-OS Fabric Configuration Guide Cisco MDS 9000 Family NX-OS Quality of Service Configuration Guide Cisco MDS 9000 Family NX-OS Security Configuration Guide Cisco MDS 9000 Family NX-OS IP Services Configuration Guide Cisco MDS 9000 Family NX-OS Intelligent Storage Services Configuration Guide Cisco MDS 9000 Family NX-OS High Availability and Redundancy Configuration Guide Cisco MDS 9000 Family NX-OS Inter-VSAN Routing Configuration Guide Cisco MDS 9000 Family Cookbook for Cisco MDS SAN-OS
Command-Line Interface
Cisco MDS 9000 Family I/O Acceleration Configuration Guide Cisco MDS 9000 Family SANTap Deployment Guide Cisco MDS 9000 Family Data Mobility Manager Configuration Guide Cisco MDS 9000 Family Storage Media Encryption Configuration Guide
Cisco MDS 9000 Family and Nexus 7000 Series System Messages Reference Cisco MDS 9000 Family SAN-OS Troubleshooting Guide Cisco MDS 9000 Family NX-OS MIB Quick Reference
lxvii
Preface
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
lxviii
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Cisco DCNM product documentation for Cisco DCNM Release 5.2 is retitled with the name Cisco DCNM for LAN. Cisco Fabric Manager product documentation for Cisco DCNM Release 5.2 is retitled with the name Cisco DCNM for SAN.
All Cisco DCNM for SAN and Cisco DCNM for LAN product documentation is now published to the Data Center Network Manager listing page on Cisco.com: http://www.cisco.com/en/US/products/ps9369/tsd_products_support_configure.html
lxix
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
lxx
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
PA R T
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
DCNM-SAN Server, page 1-1 Authentication in DCNM-SAN Client, page 1-3 DCNM-SAN Client, page 1-1 Device Manager, page 1-2 DCNM-SAN Web Client, page 1-2 Performance Manager, page 1-3 Cisco Traffic Analyzer, page 1-3 Network Monitoring, page 1-4 Performance Monitoring, page 1-4
DCNM-SAN Server
DCNM-SAN Server is a platform for advanced MDS monitoring, troubleshooting, and configuration capabilities. DCNM-SAN Server provides centralized MDS management services and performance monitoring. SNMP operations are used to efficiently collect fabric information. The Cisco DCNM-SAN software, including the server components, requires about 60 MB of hard disk space on your workstation. Cisco DCNM-SAN Server runs on Windows 2000, Windows 2003, Windows 2008, Windows XP, Windows 7, Solaris 9 and 10, and Red Hat Enterprise Linux AS Release 5. Each computer configured as a Cisco DCNM-SAN Server can monitor multiple Fibre Channel SAN fabrics. Up to 16 clients (by default) can connect to a single Cisco DCNM-SAN Server concurrently. The Cisco DCNM-SAN Clients can also connect directly to an MDS switch in fabrics that are not monitored by a Cisco DCNM-SAN Server, which ensures that you can manage any of your MDS devices from a single console.
DCNM-SAN Client
Cisco DCNM-SAN Client is a Java and SNMP-based network fabric and device management tool with a GUI that displays real-time views of your network fabric, including Cisco Nexus 5000 Series switches, Cisco MDS 9000 Family switches and third-party switches, hosts, and storage devices.
1-1
Chapter 1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DCNM-SAN Client provides Fibre Channel troubleshooting tools, in addition to complete configuration and status monitoring capabilities for Cisco MDS 9000 Family switches and Cisco Nexus 5000 Series switches. You can use these health and configuration analysis tools on the MDS 9000 Family switch or Cisco Nexus 5000 Series switch to perform Fibre Channel ping and traceroute. Fabric Manager Release 4.1(1b) and later releases provide a multilevel security system by adding a server admin role that allows access to limited features. The configuration capabilities of a server admin is limited to configuring FlexAttach and relevant data. Advanced mode option is available only for network administrators and provides all of the DCNM-SAN features, including security, IVR, iSCSI, and FICON.
Device Manager
Device Manager provides a graphical representation of a Cisco MDS 9000 Family switch chassis or Cisco Nexus 5000 Series switch chassis, including the installed switching modules, the supervisor modules, the status of each port within each module, the power supplies, and the fan assemblies. The tables in the DCNM-SAN Information pane basically correspond to the dialog boxes that appear in Device Manager. However, while DCNM-SAN tables show values for one or more switches, a Device Manager dialog box shows values for a single switch. Device Manager also provides more detailed information for verifying or troubleshooting device-specific configuration than DCNM-SAN. Device Manager provides two views: Device View and Summary View. Use Summary View to monitor interfaces on the switch. Use Device View to perform switch-level configurations including the following configurations:
Configuring virtual Fibre Channel interfaces Configuring Fibre Channel over Ethernet (FCoE) features Configuring zones for multiple VSANs Managing ports, PortChannels, and trunking Managing SNMPv3 security access to switches Managing CLI security access to the switch Managing alarms, events, and notifications Saving and copying configuration files and software image Viewing hardware configuration Viewing chassis, module, port status, and statistics
Performance Manager Summary reportsThe Performance Manager summary report provides a high-level view of your network performance. These reports list the average and peak throughput and provides hot-links to additional performance graphs and tables with additional statistics. Both tabular and graphical reports are available for all interconnections monitored by Performance Manager.
1-2
OL-25174-02
Chapter 1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Performance Manager drill-down reportsPerformance Manager can analyze daily, weekly, monthly and yearly trends. You can also view the results for specific time intervals using the interactive zooming functionality. These reports are only available if you create a collection using Performance Manager and start the collector. Zero maintenance database for statistics storageNo maintenance is required to maintain Performance Managers round-robin database, because its size does not increase over time. At prescribed intervals the oldest samples are averaged (rolled-up) and saved. A full two days of raw samples are saved for maximum resolution. Gradually the resolution is reduced as groups of the oldest samples are rolled up together.
Performance Manager
The primary purpose of DCNM-SAN is to manage the network. A key management capability is network performance monitoring. Performance Manager gathers network device statistics historically and provides this information graphically using a web browser. Performance Manager presents recent statistics in detail and older statistics in summary. Performance Manager also integrates with external tools such as Cisco Traffic Analyzer. Performance Manager has three operational stages:
DefinitionThe Flow Wizard sets up flows in the switches. CollectionThe Web Server Performance Collection screen collects information on desired fabrics. PresentationGenerates web pages to present the collected data through DCNM-SAN Web Server.
Performance Manager can collect statistics for ISLs, hosts, storage elements, and configured flows. Flows are defined based on a host-to-storage (or storage-to-host) link. Performance Manager gathers statistics from across the fabric based on collection configuration files. These files determine which SAN elements and SAN links Performance Manager gathers statistics for. Based on this configuration, Performance Manager communicates with the appropriate devices (switches, hosts, or storage elements) and collects the appropriate information at fixed five-minute intervals.
1-3
Chapter 1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Cisco Traffic Analyzer monitors round-trip response times, SCSI I/Os per second, SCSI read or traffic throughput and frame counts, SCSI session status, and management task information. Additional statistics are also available on Fibre Channel frame sizes and network management protocols.
Network Monitoring
DCNM-SAN provides extensive SAN discovery, topology mapping, and information viewing capabilities. DCNM-SAN collects information on the fabric topology through SNMP queries to the switches connected to it. DCNM-SAN recreates a fabric topology, presents it in a customizable map, and provides inventory and configuration information in multiple viewing options such as fabric view, device view, summary view, and operation view. Once DCNM-SAN is invoked, a SAN discovery process begins. Using information polled from a seed Cisco MDS 9000 Family switch, including Name Server registrations, Fibre Channel Generic Services (FC-GS), Fabric Shortest Path First (FSPF), and SCSI-3, DCNM-SAN automatically discovers all devices and interconnects on one or more fabrics. All available switches, host bus adapters (HBAs), and storage devices are discovered. The Cisco MDS 9000 Family switches use Fabric-Device Management Interface (FMDI) to retrieve the HBA model, serial number and firmware version, and host operating-system type and version discovery without host agents. DCNM-SAN gathers this information through SNMP queries to each switch. The device information discovered includes device names, software revision levels, vendor, ISLs, PortChannels, and VSANs.
Performance Monitoring
DCNM-SAN and Device Manager provide multiple tools for monitoring the performance of the overall fabric, SAN elements, and SAN links. These tools provide real-time statistics as well as historical performance monitoring. Real-time performance statistics are a useful tool in dynamic troubleshooting and fault isolation within the fabric. Real-time statistics gather data on parts of the fabric in user-configurable intervals and display these results in DCNM-SAN and Device Manager. Device Manager provides an easy tool for monitoring ports on the Cisco MDS 9000 Family switches. This tool gathers statistics at a configurable interval and displays the results in tables or charts. These statistics show the performance of the selected port in real-time and can be used for performance monitoring and troubleshooting. For a selected port, you can monitor any of a number of statistics including traffic in and out, errors, class 2 traffic, and FICON data. You can set the polling interval from ten seconds to one hour, and display the results based on a number of selectable options including absolute value, value per second, and minimum or maximum value per second.
1-4
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
This chapter describes various Cisco MDS and Nexus family switch features such as performance and inventory that you can monitor from a remote location using a web browser. This chapter includes the following sections:Information About Cisco DCNM Web Client, page 2-1 Discovering Switches, page 2-9 Licensing Advanced Features, page 1-13 Viewing Health Information, page 2-22 Viewing Performance Information, page 2-23 Viewing Inventory Information, page 2-32 Configuring Backups Using Cisco DCNM Web Client, page 2-36 Administering Cisco DCNM Web Client, page 2-43
Downloading Cisco DCNM-SAN Client, page 2-5. Cisco DCNM Web Client GUI, page 2-5. Discovering Switches, page 2-9. Licensing Advanced Features, page 2-12. Viewing Health Information, page 2-22. Viewing Performance Information, page 2-23. Viewing Inventory Information, page 2-32. Configuring Backups Using Cisco DCNM Web Client, page 2-36. Viewing and Creating Custom Reports, page 2-39. Administering Cisco DCNM Web Client, page 2-43. Using Cisco DCNM Web Client with SSL, page 2-66.
2-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Summary dashboard
The summary dashboard provides a quick view of Inventory, Health, Daily Performance, Top Hosts, Top Storage, Federation and Topology in separate windows. It provides performance trading of switches with visibility into traffic fluctuations and helps to establish baseline traffic patterns. You can double-click the dashboard to expand a window for a detailed view of individual network components. The dashboard also summarizes the information needed to manage the virtual environment including performance charts, inventory information, events, and virtual machine, and VMware ESX utilization information. From the tooltips link, click the icon to view the 24-hour performance chart of the link.
Host dashboard
The host dashboard provides you with all the information related to the discovered SAN and LAN hosts. The host dashboard provides detailed information related to the network, such as I/O traffic, disk latency, CPU, memory statistics, topology, and events about each individual host and virtual machines that are configured on top of the virtual host. The host dashboard consists of four panels:
Host panelList the hosts and their network attributes. Chart panelProvides the I/O statistics, CPU and memory information, and disk latency of
enclosures and storage enclosures. The discovered virtual machines are displayed and when you select the virtual machine, the path to the SAN data source is displayed. You can toggle this view to list all data paths.
Event panelProvides information about events of all of the switch ports that are configured
Switch Dashboard
The switch dashboard enables you to view the details of the switch including the system information, switch capacity, modules, interfaces, and licenses.
2-2
OL-25174-02
Chapter 2
Cisco DCNM Web Client Information About Cisco DCNM Web Client
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Navigating DCNM Web Client, page 2-3 Launching Cisco DCNM Web Client, page 2-4 Downloading Cisco DCNM-SAN Client, page 2-5 Cisco DCNM Web Client GUI, page 2-5 Viewing Dashboard Summary Information, page 1-5 Cisco DCNM Web Search Engine, page 2-8
Scope Menu
You can use the scope menu to filter network information as follows:
Choose SAN to view information for the contained fabrics. You can organize your fabrics and LAN switches in the Admin > Groups page.
The features accessible from the tabs are limited to the areas that you choose in the filter tree.
Printing
Click Print to view the table in a printer-friendly format. You can then print the page from the browser.
Exporting to a File
An Export icon is in the lower right corner of some tables. Click this icon to export the data to Microsoft Excel.
Sorting Columns
On some table columns, you can click a column head to sort the information for that column.
2-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSIf you are on the same workstation where you installed Cisco DCNM Web Client, open
your browser and in the Location field, enter http://localhost:PORT. Enter your port number if you specified a different port during installation. You can omit the port number if you used port 80 by default. If you are on a different workstation from where you installed Cisco DCNM Web Client, open your browser and in the Location field, enter http://yourServerAddress:PORT, where yourServerAddress is the address where you installed Cisco DCNM Web Client, and PORT is 80 by default. Enter your port number if you specified a different port during installation.
Tip
On Microsoft windows, choose Start > Control Panel > Administrative Tools > Services to verify that Cisco DCNM Web Client has started. To start Cisco DCNM Web Client, use a browser to go to the location of the service. You can also view this information by using the Admin > Status menu of Cisco DCNM Web Client. On a UNIX workstation, enter the following command:
$ /usr/local/cisco_mds9000/bin/FMServer.sh status
You see the Cisco DCNM Web Client Login dialog box. The text field at the bottom shows the Message of the Day from the server that you logged into.
Step 2 Step 3
Note
If you have a new installation of Cisco DCNM-SAN, the default user ID and password is admin/password. We recommend that you change your password the first time that you use Cisco DCNM-SAN Server. If you do not have a new installation, you can use any existing passwords.
Note
If you are using FireFox to access Cisco DCNM Web Client, you might receive a warning message indicating a problem with the security certificate of the website. To resolve this issue, you might need to add the security exception that is described in the next procedure.
2-4
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 4
Note
This message appears only the first time that you launch Cisco DCNM-SAN Client.
DETAILED STEPSOn the warning page, click Or you can add an exception.
Click Add Exception. The Add Security Exception dialog box appears. Click Get Certificate. Read the text that describes the problems with this site. Click Confirm Security Exception.
Step 3
Step 4
2-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-1 Cisco DCNM Web Client
Note
The content in each pod depends upon the selected scope. This section includes the following topics:
Viewing Health Summary Information, page 2-6 Viewing Performance Summary Information, page 2-7 Viewing Inventory Summary Information, page 2-7 Viewing Switch Information, page 1-6
DETAILED STEPSFrom the menu bar, choose Dashboard > Summary and then double-click the Health
Summary view. You see the Summary window. In the left side of the window, you see a summary table of problems and in the right side of the window, you see a summary table of events for the last 24 hours .
Step 2
Click the warnings next to Switches, ISLs, Hosts, or Storage (other than 0) to see an inventory of switches, ISLs, or end devices for that fabric.
2-6
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 3
Choose the number of events next to the event severity levels (Emergency, Alert, Critical, Error, Warning, Notice, Info, or Debug) to see a summary of events and descriptions for that fabric.
DETAILED STEPSFrom the menu bar, choose Dashboard > Summary and then click Daily Performance
view. You see the Summary information.
(Optional) Click ssh to access the switch through Secure Shell (SSH). (Optional) Click Device Manager to access the switch through Hypertext Transfer Protocol (HTTP) for that switch. (Optional) Click Accounting to go to the Accounting page for that switch. (Optional) Click Backup to go to the Configuration view page. (Optional) Click Events to go to the Fabric Events page.
Note
This physical port capacity feature is available for Cisco DCNM licensed switches only.
2-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The physical port capacity area includes the available ports in each tier, such as 40G, 10G, 8G, 4G, 2G, and 1G and also the predicted number of days remaining to reach the maximum (100%) utilization.
Step 8 Step 9 Step 10
Click a number under the Days left column to view the capacity trend. Choose the Modules tab to display all the modules that are discovered on the switch. Choose the Interfaces tab to display all the interfaces that are discovered for the switch. Click the icon next to the interface name to view the 24-hour performance data of the interface. When you click on a link in the ConnectedTo column, you see the other end of where the the interface is connected. For example, if the other end of the interface is a switch interface, then it launches the Interfaces tab of the switch that the interface is connected. If the interface is connected to a end device, then it lauches the host or storage dashboard. If it is connectedto another switch interface, then it launches the Switch dashboard->Interfaces tab of the switch that it is connected to. If connected to end device then it launches the Host or Storage dashboard filtered by the connected Enclosure. Choose the Licenses tab to display all the licenses installed on the switch. Choose the Features tab to display a list of all the features installed on the switch.
Step 11
Step 12 Step 13
Note
DETAILED STEPSClick Search box on the top-right corner of the main window.
You see the search text box. In the text box, enter the name to search. Click the search icon on the right side of the text box to start searching, and choose the appropriate radio button. A window appears with your results. Click the entity type to see the details. You see the details of the selected entity in the right pane.
Step 2 Step 3
Step 4
2-8
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Discovering Switches
This feature enables you to discover the various Cisco devices (Cisco MDS Family switches, Cisco NX-OS devices, and Catalyst switches) from a single interface. When a discovery task succeeds, Cisco DCNM retrieves the running configuration and status information of the discovered Cisco NX-OS devices. Use this procedure for the following purposes:
To discover the Cisco LAN and SAN devices. To view the task details for the common LAN discovery. To discover devices that are not currently managed by Cisco DCNM. For example, you should use this procedure when Cisco DCNM has not yet discovered any devices, such as after a new installation. To discover devices that you have added to your network without rediscovering devices that Cisco DCNM already has discovered. To rediscover the topology when Cisco Discovery Protocol (CDP) links have changed, without rediscovering devices that Cisco DCNM has already discovered. To move the discovered LAN task to a different Cisco DCNM server in the federation.
Note
You must successfully discover a Cisco NX-OS device before you can use Cisco DCNM to configure the device. This section includes the following topics:
Discovering a Cisco Device, page 2-9 Rediscovering a Device, page 1-11Rediscovering a Device, page 2-11 Managing LAN Devices, page 2-11 Removing LAN Devices, page 2-11 Modifying LAN Devices, page 2-12 Moving LAN Devices, page 2-12
Note
The discovery process can perform a complete discovery of neighbors only if the neighboring devices are configured with the same credentials as the seed device.
2-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 1
DETAILED STEPSFrom the Feature Selector pane, choose Admin > General > Data Sources.
The discovery tasks appear in the Fabric and LAN panes. Discover the LAN devices, and click on the + icon on the top right corner. The Add LAN Data Source window appears. In the Add LAN Data Source window, click Hops from seed switch in the Discovery Type field to set the common LAN discovery by hops, click Switch List to set the common LAN discovery by switch range, click FWSM to choose the firewall service module, or click FWSM to set the common LAN discovery for FireWall task. If you click the Hops from seed switch radio button, enter the seed switch IP in the Seed Switch field. If you click the Switch List radio button, enter the list of switch IP addresses or range in the Seed Switch field. For example, 172.22.31.111, 172.22.34.100-105. If you choose the Max Hops from Seed or Switch List, enter the user credentials with the option of SNMPV1 or SNMPV3. If you choose FWSM, choose the group.
Step 2
Step 3
Step 4
Step 5
Note
For a deep discovery of DCNM-LAN devices, choose SNMPV3. To enable a deep discovery for individual LAN devices, use the Edit LAN Task dialog box. From the discovery timeout drop-down, choose the time in seconds, enter the user credentials, and choose Group. Click Next. The Shallow LAN Discovery window appears. In the Shallow LAN Discovery window, choose one or more switches for LAN discovery.
Step 6 Step 7
Step 8
Note
Unknown, unsupported, unreachable, or failed authentication switches are displayed but you cannot choose them. (Optional) You can click Previous to run the discovery again with an increased timeout, or to increase or decrease the number of hops. Click Add. The selected switches are added to the new LAN discovery. Wait until the status for the task is Successful. This step might take several minutes. After the status is Successful, you can use Cisco DCNM to configure and monitor the discovered devices. At this state, DCNM-SAN has completed the shallow discovery for the LAN devices. You do not need to save your changes. The discovered switches are added to the group. View the added device under each switch by expanding the entry. The group for each Ethernet switch can be viewed and changed individually. View the status of the discovery tasks by choosing the Discovery Task and Device Credentials tab in the task pane.
Step 12 Step 13
2-10
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
RELATED TOPICS
Rediscovering a Device, page 2-11Rediscovering a Device You can rediscover one or more devices.
Note
Rediscovery replaces any configuration data that Cisco DCNM has for a Cisco NX-OS device with new configuration data that is retrieved during the rediscovery. If you need to discover one or more devices without retrieving configuration and status information for already discovered devices, see the Discovering a Cisco Device section on page 2-9. You must successfully discover a Cisco NX-OS device before you can use Cisco DCNM to configure the device.
DETAILED STEPSFrom the Feature Selector pane, choose Admin > General > Data Sources.
The discovery tasks and their status appear in the Discovery Tasks area of the Discovery Tasks pane. Select the discovery task that needs to be rediscovered. Click Rerun to start the rediscovery process.
Step 2 Step 3
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
You see the list of LANs (if any) that are managed by Cisco DCNM-SAN. Click Add. You see the Add LAN CDP Seed dialog box. Enter the CDP seed switch IP address. (Optional) Check the SNMPV3 check box. If you check SNMPV3, the Community field changes to Username and Password. You must enter your username and password. Enter the username and password for this LAN. Click Add to begin managing this LAN.
Step 2
2-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 1 Step 2
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
Check the check box next to the LAN that you want to remove and click Remove to discontinue data collection for that LAN.
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
Check the check box next to the LAN that you want to edit and click Edit. You see the Edit LAN CDP Seed dialog box. Enter a new LAN name, username and password, privacy settings and specify how you want Cisco DCNM Web Client to manage the fabric by selecting one of the status options. Click Apply to save the changes.
Step 3 Step 4
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
Choose the fabrics from the fabric table. Click Move Fabrics to another Federation Server or Move LAN Tasks to another DCNM Server. Choose the fabrics that need to be moved and click Move Fabric. In the Move Fabrics to another Federation server dialog box, choose the DCNM server where the fabrics will be moved. The server drop-down list will list only the active servers. In the Move LAN Tasks to another DCNM Server dialog box, enter the LAN tasks that need to be moved and specify the DCNM server. Note the following:
Step 4
This feature is available on the federation setup and the Move Fabric is displayed in the federation setup screen. You can move the fabrics from a sever that is down to an active server. The management state remains the same.
Cisco DCNM-LAN Features, page 2-13 Cisco DCNM-SAN Features, page 2-15 Cisco DCNM Server-Based Licenses, page 2-17 Installing Cisco DCNM Licenses, page 1-18 Viewing Licenses Using the Cisco DCNM Wizard, page 2-18
2-12
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Feature Port/port channel Static port pinning Link Aggregation Control Protocol (LACP) VLAN 802.1q/P VLAN Spanning Tree Protocol (STP) (Multiple Spanning Tree (MST), Rapid per VLAN Spanning Tree (RPSVT) Access control list (ACL) (MAC, IP, VLAN) Port security Traffic storm control IGMP snooping AAA Environmental (HwRes Utilization with ternary content addressable memory (TCAM) statistics) Module temperature Switched Port Analyzer (SPAN) Discovery and inventory
2-13
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 2-1 Cisco DCNM-LAN Features (continued)
Feature Fault management (filtering, TCA, and actions) Traffic statistics reports Role-based Access Control (RBAC) Port profile Template center Web services and Java API Virtual port channels (vPCs) 802.1X Gateway Load-Balancing Protocol (GLBP) Object tracking Keychain management DHCP snooping Dynamic ARP Inspection ARP access control lists (ACLs) IP Source Guard Traffic storm control Port security
2-14
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 2-1 Cisco DCNM-LAN Features (continued)
Feature IP tunnels Virtual device contexts (VDCs) Logical vPC view of the Topology feature Display of historical statistical data FabricPath Host tracking
Note
Cisco DCNM requires licenses only for Cisco Nexus 7000, 5000, and 3000 Series switches and do not require licenses for Cisco Nexus 4000, 1000V, and Cisco Catalyst 6500 series switches. To purchase licenses for all the advanced edition features, see Cisco DCNM Release Notes, Release 6.x.
Feature FC/FCoE/FICON/iSCSI topology view Fabric, device, and summary views Port, switch, and fabric-level configuration MDS event and secuity management
2-15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 2-2 Cisco DCNM-SAN Features (continued)
Feature Configuration wizards MDS configuration analysis tool Network diagnostic and troubleshooting tools Real-time performance monitoring Multiple fabric management (concurrently) Centralized management server with discovery Web Client for operational view Continuous health and event monitoring Historical performance monitoring and reporting Event forwarding Cisco DCNM proxy services Cisco Fabric Analyzer integration Roaming user profiles VMpath analytics Dashboards (Summary, host, switch, network)
Note
Cisco DCNM requires licenses only for Cisco Nexus 7000, 5000, and 3000 Series switches and do not require licenses for Cisco Nexus 4000, 1000V, and Cisco Catalyst 6500 series switches. To purchase licenses for all the advanced edition features, see Cisco DCNM Release Notes, Release 6.x.
2-16
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Platform MDS 9200 MDS 9100 MDS 9500 Nexus 7000 SAN Nexus 5000 SAN Nexus 7000 LAN Nexus 5000 L/S Nexus 5000 LAN Nexus 3000 LAN
Paper PIDs (comes in envelope) DCNM-SAN-M92-K9= DCNM-SAN-M91-K9= DCNM-SAN-M95-K9= DCNM-SAN-N7K-K9= DCNM-SAN-N5K-K9= DCNM-N7K-K9= DCNM-LS-N5K-K9= DCNM-LAN-N5K-K9= DCNM-LAN-N3K-K9=
eDelivery PIDs (email) L-DCNM-S-M92-K9= L-DCNM-S-M91-K9= L-DCNM-S-M95-K9= L-DCNM-S-N7K-K9= L-DCNM-S-N5K-K9= L-DCNM-N7K-K9= L-DCNM-LS-N5K-K9= L-DCNM-L-N5K-K9= L-DCNM-L-N3K-K9=
Services PIDs (yearly subscription) CON-SAU-SM92K9 CON-SAU-SM91K9 CON-SAU-SM95K9 CON-SAU-N7SDCN M CON-SAU-N5SDCN M CON-SAU-N7DCNM CON-SAU-N5LSDC NM CON-SAU-N5DCNM CON-SAU-N5DCNM
Note
Ensure that the security agent is disabled when you load licenses.
2-17
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-2 Installing Cisco DCNM Licenses
Download the license pack file that you received from Cisco into a directory on the server system.
Step 3
Note
Ensure that you do not edit the contents of the .lic file or the Cisco DCNM software ignores any features that are associated with that license file. The contents of the file are signed and must remain intact. When you accidentally copy, rename, or insert the license file multiple times, the duplicate files are ignored, but the original will be counted.
2-18
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-3 Cisco DCNM Licenses
Note
2-19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 2-4 displays the Cisco DCNM server license fields.
Table 2-4 Cisco DCNM Server License Files
Description Name of the license file. Describes the feature name specified in the license file. The following values are supported:
PID
Describes the product ID found in the vendor string of the license file. For example, DCNM-N7K-K0 is an enterprise license for Cisco Nexus 7000 Series switches. Lists the number of SAN licenses used and that are available. Lists the number of LAN licenses used and that are available. Displays the expiry date of the license.
Note
Text in the eval expiration field will be in red for licenses that expire in seven days.
Description Displays if it is a fabric or a LAN group. Displays the name of the switch. Displays the model of the device. For example, DS-C9124 or N5K-C5020P-BF. Displays the license state of the switch that can be one of the following:
2-20
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 2-5 Cisco DCNM Switch Licenses (continued)
Description Displays if the license is a switch-based embedded license or a server-based license. Displays the expiry date of the license.
Note
Text in the eval expiration field will be in Red for licenses that expires in seven days.
Managing Licenses
This section includes the following topics:
Adding Cisco DCNM Licenses, page 2-21 Assigning Licenses, page 2-21 Unassigning Licenses to a Switch, page 2-22
Step 2 Step 3
Assigning Licenses
BEFORE YOU BEGIN
You must have network administrator privileges to complete the following procedure.
Step 1
2-21
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
You see the licenses table.
Step 2 Step 3
From the table, choose the switch that you want to assign the license to. Click Assign License.
Step 2 Step 3
EventsShows a detailed list of data center events. You can filter these events by scope, date, and type of event. AccountingShows a list of accounting events. Virtual Port Channels (LAN only) Viewing Accounting Information, page 2-22 Viewing Events Information, page 2-22
Step 2
Step 2
2-22
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
SwitchShows the CPU, memory, and traffic information. End DevicesShows a detailed list of end devices (host or storage), port traffic, and errors. ISLsShows a detailed list of ISL traffic and errors. NPV Links Shows a detailed list of traffic between NPV devices and ports. FlowsShows a detailed list of host-to-storage traffic. EthernetShows a detailed list of Ethernet interfaces. OthersShows a detailed list of other statistics. Virtual Port ChannelsShows a list of vPC utilization. Viewing Switch CPU Information, page 2-23 Viewing Switch Memory Information, page 2-24 Viewing Switch Traffic and Errors Information, page 2-24 Viewing ISL Traffic and Errors Information, page 2-24 Viewing Performance Information on All the Ports, page 2-25 Viewing Performance Information on Host Ports, page 2-25 Viewing Performance Information on Storage Ports, page 2-25 Viewing Performance Information on Host Enclosures, page 2-25 Viewing Performance Information on Storage Enclosures, page 2-25 Viewing Performance Information on Port Groups, page 2-26 Viewing Performance Information for NPV Links, page 2-26 Viewing Performance Information for Flows, page 2-27 Viewing Performance Information for Ethernet Ports, page 2-28 Viewing Other Statistics, page 2-28 Viewing Performance Information for Virtual Port Channels, page 1-30
DETAILED STEPSFrom the menu bar, choose Performance > Switch > CPU.
You see the CPU pane. This pane displays the CPU information for the switches in that scope. Reduce or expand the scope of what is displayed by using the scope tree on the top of the CPU pane. Click the chart icon in the Switch column to see a graph of the traffic on that device for the past 24 hours.
Step 2 Step 3
2-23
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSFrom the menu bar, choose Performance > Switch > Memory.
You see the memory pane. This pane displays the memory information for the switches in that scope. Reduce or expand the scope of what is displayed by using the scope tree on the top of the CPU pane. Click the chart icon in the Switch column to see a graph of the bandwidth information for the end devices in that VSAN.
Step 2 Step 3
DETAILED STEPSFrom the menu bar, choose Performance > Switch > Traffic.
You see the Switch Traffic and Errors pane. This pane displays the traffic on that device for the past 24 hours.
Note
Notation NaN (Not a Number) in the data grid means that it is a negative value.
Note
There are variations to this procedure. In addition to these basic steps, you can perform the following steps to view detailed information for ISLs:
To change the time range for this graph, select it from the drop-down list in the upper-right corner. To view the detailed information for a specific period, drag the slider control to choose the time interval for which you need the information. To view information in a grid format, click the grid icon in the bottom right corner. To export the data into a spreadsheet, choose the grid format, and then click on the export to excel link.
Note
By default, numbers are exported in raw, unformatted style. If you want to export numbers as displayed, set the export.unitless=false in the server.properties (or edit Admin > Server Properties) file. Restart the Cisco DCNM server after you export the numbers.
To view real-time information, choose Real Time from the drop-down list in the upper right corner. The real-time data is updated in every 10 seconds.
2-24
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSFrom the menu bar, choose Performance > End Devices > All Ports.
You see the End Devices window. Reduce or expand the scope of what is displayed by using the scope menu. Click the chart icon in the Name column to see a graph of the traffic on that device for the past 24 hours.
Step 2 Step 3
DETAILED STEPSFrom the menu bar, choose Performance > End Devices > Host Ports.
You see the End Devices window. Reduce or expand the scope of what is displayed by using the scope menu. Click the chart icon in the Name column to see a graph of the traffic on that device for the past 24 hours.
Step 2 Step 3
DETAILED STEPSFrom the menu bar, choose Performance > End Devices > Storage Ports.
You see the End Devices window. Reduce or expand the scope of what is displayed by using the scope menu. Click the chart icon in the Name column to see a graph of the traffic on that device for the past 24 hours.
Step 2 Step 3
DETAILED STEPSFrom the menu bar, choose Performance > End Devices > Host Enclosure.
You see the End Devices window. Reduce or expand the scope of what is displayed by using the scope menu. Click the chart icon in the Name column to see a graph of the traffic on that device for the past 24 hours.
Step 2 Step 3
DETAILED STEPSFrom the menu bar, choose Performance > End Devices > Storage Enclosure.
You see the End Devices window. Reduce or expand the scope of what is displayed by using the scope menu. Click the chart icon in the Name column to see a graph of the traffic on that device for the past 24 hours.
Step 2 Step 3
2-25
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSFrom the menu bar, choose Performance > End Devices > Port Groups.
You see the End Devices window. Reduce or expand the scope of what is displayed by using the scope menu. Click the name port group to see the members of that port group.
Step 2 Step 3
Note
There are variations to this procedure. In addition to these basic steps, you can also perform the following steps to view detailed information for the port groups:
To change the time range for this graph, select it from the drop-down list in the upper right corner. To view the detailed information for a specific period, drag the slider control to choose the time interval for which you need the information. To view information in a grid format, click the grid icon in the bottom right corner. To export the data into a spreadsheet, click the excel icon in the upper right corner and then click Save. To view real-time information, choose Real Time from the drop-down list in the upper right corner. The real-time data is updated in every 10 seconds.
DETAILED STEPSFrom the menu bar, choose Performance > NPV Links.
You see the NPV Link and Traffic Errors window. This window displays the NPV links in that scope. Reduce or expand the scope of what is displayed by using the scope menu. Click the chart icon in the Name column to see a list of the traffic for the past 24 hours.
Step 2 Step 3
Note
There are variations to this procedure. In addition to these basic steps, you can also perform the following steps to view detailed information for NPV links:
You can change the time range for this information by selecting it from the drop-down list in the upper-right corner. To view the detailed information for a specific period, drag the slider control to choose the time interval for which you need the information. To view information in a grid format, click the grid icon in the bottom-right corner. To export the data into a spreadsheet, click the excel icon in the upper-right corner and then click Save. To view real-time information, choose Real Time from the drop-down list in the upper right corner. The real-time data is updated in every 10 seconds.
2-26
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2 Step 3
Note
There are variations to this procedure. In addition to these basic steps, you can also perform the following steps to view detailed information for flows:
To change the time range for this graph, select it from the drop-down list in the upper right corner. To view the detailed information for a specific period, drag the slider control to choose the time interval for which you need the information. To view information in a grid format, click the grid icon in the bottom right corner. To export the data into a spreadsheet, click the excel icon in the upper right corner and then click Save. To view real-time information, choose Real Time from the drop-down list in the upper right corner. The real-time data is updated in every 10 seconds.
2-27
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
Note
There are variations to this procedure. In addition to these basic steps, you can also perform the following steps:
Select the time range, and click Filter to filter the display. Select the name of a Ethernet port from the Name column to see a graph of the traffic across that Ethernet port for the past 24 hours. You can change the time range for this graph by selecting it from the drop-down list in the upper right corner.
Step 2
Note
There are variations to this procedure. In addition to these basic steps, you can also do the following:
Select the time range, and click Filter to filter the display. Select the IP address of a switch from the Name column to see a graph of the traffic across that switch for the past 24 hours. You can change the time range for this graph by selecting it from the drop-down list in the upper right corner.
Note
To configure other statistics, follow the instructions described in the Configuring Other Statistics section on page 2-60.
DETAILED STEPSFrom the menu bar, choose Performance > Virutal Port Channel (vPC).
You see the vPC window. This window displays the vPC information. Click the print Click the Excel spreadsheet. icon to print the vPC information of the selected device. icon to export the vPC information of the selected device to a Microsoft Excel
Step 2 Step 3
Cisco DCNM Web Client enables you to view the relationship among virtual port channels (vPCs). You can view the statistics of all member interfaces and the aggregate of the statistics at the port channel level.
Step 1
DETAILED STEPSFrom the menu bar, choose Performance > Virtual Port Channel (vPC).
2-28
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The vPC performance statistics appears and the aggregated statistics of all vPCs are displayed in a tabular manner. See Figure 2-4.
2-29
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-4 Aggregated vPC Statistics View
icon to print the vPC performance statistics. icon to export the vPC performance statistics to a Microsoft Excel spreadsheet.
Click on a device name in the Primary vPC Peer or Secondary vPC peer column to view its member interfaces. A popup window displays the member interfaces of the selected device. See Figure 2-5.
2-30
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-5 Member Interfaces Popup Window
Step 5
Click the
The traffic distribution statistics appears at the bottom of the vPC window. By default, the Cisco DCNM Web Client displays the historical statistics for 24 hours. See Figure 2-6.
Figure 2-6 Traffic Utilization View
From the drop-down list, choose a time period, 24 Hours, Week, Month, or Year to view the historical statistics of the selected interface. Click the Click the Click the Click the Click the Click the icon to display the traffic data in the grid view. icon to display the traffic statistics in the line-chart view. icon to display the traffic statistics in the stacked-chart view. icon to predict the traffic statistics. icon to interpolate missing data. icon to close the Traffic area of the selected interface.
2-31
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
VSANsShows details about VSANs. SwitchesShows details about switches. LicensesShows details about the licenses in use in the fabric. ModulesShows details for MDS switching and services modules, fans, and power supplies. End DevicesShows the host and storage ports. ISLsShows the Inter-Switch Links. NPV LinksShows the links between NPV devices and ports. Active ZonesShows regular zones and IVR zones.
Note
Beginning with Cisco DCNM release 6.x, you can view the inventory and the performance for both LAN and LAN switches by using the global Scope pane. You can select LAN, SAN, or both to view the inventory information. You can also export and prin t the inventory information. This section includes the following topics:
Viewing Inventory Information for VSANs, page 2-32 Viewing Inventory Information for Switches, page 2-33 Viewing License Information, page 2-33 Viewing Inventory Information for Modules, page 2-33 Viewing Inventory Information for All Ports on End Devices, page 2-33 Viewing Inventory Information for Host Ports on End Devices, page 2-34 Viewing Inventory Information for Storage Ports on End Devices, page 2-34 Viewing Detailed Information for ISLs, page 2-34 Viewing Inventory Information for NPV Links, page 2-34 Viewing Inventory Information for Regular Zones, page 2-34 Viewing Inventory Information for IVR Zones, page 2-35 Viewing Information About Port Mapping, page 1-37
Step 2
2-32
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
There are variations to this procedure. In addition to these basic steps, you can also do the following:
Select the status level and then click Filter to filter the display to show all VSANs or only those with errors.
Step 2
Select a SAN to display switch inventory information for all fabrics in the SAN. Reduce or expand the scope of what is displayed by using the scope menu.
Step 2
Note
There are variations to this procedure. In addition to these basic steps, you can also do the following:
Select the status level, and click Filter to filter the display to show all licenses or only those with licenses errors.
Step 2
Select a SAN to display module inventory information for all fabrics in the SAN. Reduce or expand the scope of what is displayed by using the scope menu.
DETAILED STEPSFrom the menu bar, choose Inventory > End Devices > All Ports.
You see the End Devices window. Reduce or expand the scope of what is displayed by using the scope menu.
Step 2
2-33
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSFrom the menu bar, choose Inventory > End Devices > Host Ports.
You see the End Devices window. Reduce or expand the scope of what is displayed by using the scope menu.
Step 2
DETAILED STEPSFrom the menu bar, choose Inventory > End Devices > Storage Ports.
You see the End Devices window. You can reduce or expand the scope of what is displayed by using the scope menu.
Step 2
Step 2
Note
There are variations to this procedure. In addition to these basic steps, you can also perform the following step:
Select the status level, and click Filter to filter the display to show all ISLs or only those ISLs with errors.
DETAILED STEPSFrom the menu bar, choose Inventory > NPV Links.
You see the NPV Links window. Reduce or expand the scope of what is displayed by using the scope menu.
Step 2
DETAILED STEPSFrom the menu bar, choose Inventory > Active Zones > Regular Zones.
You see the Regular Zones window. Reduce or expand the scope of what is displayed by using the scope menu.
Step 2
2-34
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
There are variations to this procedure. In addition to these basic steps, you can also do the following:
Select the status level, and click Filter to filter the display to show all zones or only those zones with errors.
DETAILED STEPSFrom the menu bar, choose Inventory > Active Zones > IVR Zones.
You see the IVR Zones window. Reduce or expand the scope of what is displayed by using the scope menu.
Step 2
Note
There are variations to this procedure. In addition to these basic steps, you can also do the following:
Select the status level, and click Filter to filter the display to show all zones or only those with zones errors.
Port Mapping
Beginning with Cisco NX-OS Release 6.x, you can view information about all the logical and physical Ethernet interfaces of all the devices that are discovered by Cisco DCNM Web Client.
Viewing the Port MapperYou can view the Port Mapper report from Cisco DCNM Web Client.
Step 1
DETAILED STEPSFrom the menu bar, choose Inventory > Port Mapper.
You see the Port Mapper window. See Figure 2-7.
Figure 2-7 Port Mapper Window
2-35
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
In the Port Mapper window, you see the following details listed in Table 2-6.
Table 2-6 Port Mapper
Column Device Interfaces Type Admin Status Operation status Speed Duplex STP Protocol
Description Name of the device to which the interface belongs to. Name of the interface. Type of the port mode: switched or routed. Single port channel that is connected to two single chassis vPC end points. Operational model for the port. Speed for the interface. It is not the configured speed. Single port channel that is connected to two single chassis vPC end points. Spanning Tree Protocol (STP) whether or not the Per-VLAN Spanning Tree (PVST), Multiple Spanning Tree (MST), and rapid-PVST is configured. Access VLAN if the port mode is access or displays allowed VLAN if the port mode is trunk. MAC address for the port. IP address that is configured on the port and the IP mask. Serial number of the Small Form-Factor Pluggable (SFP) if it is attached on the port.
Step 2
The filter options in the Device, Interface Name, Description, Access/Allowed VLANs, Built-in MAC Address, IP Address/Mask, and SFP Series Number column allows you to enter text inputs in the respective field and search. In addition, you can use the drop-down list in the Mode, Admin Status, Operation Status, Speed, Duplex, and STP Protocol column to limit the objects that appear in the report.
Step 3 Step 4 Step 5
icon to print the port mapping report of the selected device. icon to export the port mapping report of the selected device to a Microsoft Excel
Click on a cell in the STP Protocol column to view the STP status of the specific port of the VLAN. A popup window displays the STP status of the port.
Note
Beginning with Cisco DCNM Release 6.x, the backup for the LAN configuration are also supported and the backup is skipped for the all the switches where there are no configuration changes.
2-36
OL-25174-02
Chapter 2
Cisco DCNM Web Client Configuring Backups Using Cisco DCNM Web Client
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
This section includes the following topics:
Viewing a Configuration, page 2-37 Editing a Configuration, page 2-37 Deleting a Configuration, page 2-38 Copying a Configuration, page 1-40 Comparing Configurations, page 2-38 Creating Backups, page 2-39 Viewing Scheduled Jobs, page 2-39
Viewing a Configuration
Step 1
Step 2
Note
The scope pane displays the global view with SAN, LAN, and Default LAN groups. Depending upon the value selected in the Scope pane, the switches and their configurations are listed.
From the Switch drop-down list, select a switch. From the Configuration file drop-down list, select a configuration filename. Check the Show All checkbox to display all the configurations present, irrespective of the options selected in the global Scope pane. Click View.
Editing a Configuration
Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7
2-37
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Deleting a Configuration
Step 1
The Scope pane displays the global view with SAN, LAN, and Default LAN groups. Depending upon the value that you select in the Scope pane, the switches and their configurations are listed.
From the Scope pane, select a fabric name. From the Switch drop-down list, select a switch. From the Configuration file drop-down list, select a configuration filename. Click Delete.
Copying a Configuration
Step 1
The Groups pane displays the global view with SAN, LAN, and Default LAN groups. Depending upon the value that you select in the Scope pane, the switches and their configurations are listed.
From the Groups pane, select a fabric name. From the Eligible Switch(es) drop-down list, select a switch. From the Configuration file drop-down list, select a configuration file name. Click Copy.
Comparing Configurations
Step 1
Configuring Templates
Step 1
Step 2
2-38
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 3 Step 4 Step 5
You can also Add a new template or Import an existing template. Enter a Template Name, Description, Tags and select the Supported Platforms. Click Save to save the template.
Creating Backups
Prerequisites
You must make sure that the bootflash has enough unused space to accommodate configuration backup jobs.
Step 1
Step 2
Note
Beginning with Cisco DCNM Release 6.x versions, reports can be generated for SAN and LAN. The global view Scope pane will contain SAN, LAN, and Default LAN configurations. You can select any one of these configurations, and generate reports. The Report menu includes the following submenus:
ViewDisplays previously saved reports. GenerateGenerates a custom report based on the selected report template.
2-39
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CustomCreates a custom report template, which allows you to select any combination of events, performance categories, and inventory. The reports contain memory information for all the selected switches. JobsDisplays scheduled jobs based on the selected report template. Creating a Custom Report Template, page 2-40 Viewing a Report Based on a Specific Template, page 2-41 Viewing a Reports by a Specific User, page 2-41 Deleting a Report Template, page 2-41 Generating a Report Based on a Template, page 2-41 Modifying a Custom Report Template, page 2-42 Deleting a Report, page 2-43 Viewing Scheduled Jobs Based on a Report Template, page 2-43
The Customs panel allows you to add new templates, modify existing templates and delete existing templates. The Configuration panel allows you to configure a new template when it is added and modify an existing template. The options in the configuration panel are disabled until you either add a new template or select an existing template. The upper portion of the configuration panel contains many categories that you can choose and configure. The User Selection panel displays your configuration options in real time. While the configuration panel can display information pertaining to one category at a time, the User Selection panel displays all of your selections or configurations.
Step 1
DETAILED STEPSFrom the menu bar, choose Report > Create SAN User Defined.
You see the Report Configuration window. Click CLICK TO ADD NEW CUSTOM in the Customs panel to create a new name for your report.
Step 2
2-40
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 3 Step 4 Step 5 Step 6
Click Scope in the Configuration panel to define the scope. The global Scope panel will have SAN, LAN, and Default LAN configurations. Indicate the information you want in the report by navigating to each category such as Health, Performance, and Inventory in the Configuration panel. (Optional) Choose Severity for events, Status for inventory information, or Type of end devices for performance information and inventory information. Click Save to save this report template.
DETAILED STEPSIn the Template panel, click the report template that you want to delete.
Drag the selected report template to the trash at the right-bottom corner of the Template panel. Click Yes to delete the template.
2-41
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
From the menu bar, choose Reports > Generate. You see the Generate Custom Report window. Click Scope in the configuration panel to define the scope. The global Scope panel has SAN, LAN, and Default LAN configurations. Choose a report template from the available drop-down list. (Optional) Change the name of the report. By default, report names are based on the date and time generated. (Optional) Check the Report is only visible to the Owner check box to change the attribute of the report. If selected, the report can be viewed only by the specific user and network administrator. (Optional) Check the Export to CSV check box to export the report in text. (Optional) In the Email Report option, do one of the following actions:
Choose No to not to receive an e-mail notification. Choose Link Only to receive the link in an e-mail. Choose Contents to receive an e-mail notification.
Step 9 Step 10
(Optional) In the user selection option, check the Embed Charts in Reports checkbox to view the reports weekly. Click Create to generate a report based on this template. You see the report results in a new browser window. Alternatively, you can view the report by choosing Report > View and selecting the report name from the report template that you used in the navigation pane.
Step 11
Click Schedule to schedule a report based on this template. You see the schedule panel. You see the Generate Custom Report window. In the Schedule panel, specify the scheduled run time and how often you want the report to run. Click the calendar next to Start Date or End Date to modify the date settings. Choose the Start Time or End Time drop-down list to modify time settings. Select the frequency at which you need the report to be generated. Enter a name for the report in the Job Name field and click Create to save the report. You can view the scheduled reports on the Jobs page but once the scheduled jobs have started running, they are removed from the Scheduled Job table.
Note
The End Date must be at least five minutes earlier than the Start Date.
DETAILED STEPSFrom the menu bar, choose Reports > Create SAN User Defined.
You see the Customs, Configuration and User Selection panels. Double-click to select a report from the customs panel. You see the current information about this report in the Configuration panel. Indicate the information that you want to gather in the report by clicking the Health, Performance, and Inventory tabs in the Configuration panel.
Step 2
Step 3
2-42
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 4 Step 5
(Optional) Select a severity level for events, status for inventory information, or type of end device for performance information and inventory information. Click Save to save this report template.
Note
You cannot change the SAN, fabric, or VSAN that the report is based on. Generate a new report for a new SAN, fabric, or VSAN.
Deleting a Report
BEFORE YOU BEGIN
Reports you generate are saved by DCNM Web Client. To delete a custom report, you need to first select the report that you want to delete.
Step 1 Step 2 Step 3 Step 4
Step 2
StatusDisplays the status of the Database Server and allows you to start and stop Performance Collector services on your server. You should restart services only if something is not working properly or if too large a percentage of system resources are being consumed.
Note
You cannot start or stop the Database Server services using DCNM Web Client. If you are using the Microsoft Windows operating system, you need to use Microsoft Management Console to stop, start, or restart the Database Server. LogsAllows you to view all the logs from the various services running on the Cisco DCNM-SAN Server. Data SourcesAllows you to view all the data sources such as Fabric, LAN, VMware, and so on. ClientsAllows you to view all the clients connected to the Cisco DCNM-SAN Server
2-43
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Server PropertiesAllows you to view all the fields defined in the server properties config file. SFTP CredentialsAllows you to view the SFTP credentials.
Note
If you see a database file lock error in the database log, you can fix it by shutting down and restarting the database server using the Web Client.
Note
Only network administrators can access the DCNM Web Client Admin options. Network operators cannot view the Admin options.
Adding, Editing, and Removing Managed Fabrics, page 2-44 Adding, Editing, and Removing VMware Servers, page 2-46 Starting, Restarting, and Stopping Services, page 2-47 Viewing a vPC, page 2-47 Resolving vPC Inconsistencies, page 2-48 Searching for a Device, page 2-49 Viewing Log Information, page 2-51 Configuring Cisco DCNM-SAN Server Properties, page 2-51 Configuring SFTP Credentials, page 2-51 Viewing Events, page 2-51
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
You see the list of fabrics (if any) managed by Cisco DCNM-SAN in the Opened column. Click Add. You see the Add Fabric dialog box. Enter the seed switch IP address for this fabric. Enter the SNMP username and password for this fabric. (Optional) Check the SNMPV3 check box. If you check SNMPV3, the fields Read Community and Write Community change to Username and Password. You must enter your username and password. Select the privacy settings from the Auth-Privacy drop-down list.
Step 2
2-44
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 7 Step 8 Step 9
(Optional) Check the Limit Discovery by VSAN checkbox to specify the included VSAN list or excluded VSAN list from the VSANs provided to discover a new fabric. (Optional) Check the Enable NPV Discovery in all Fabrics check box. If you check enable NPV discovery in all fabrics, the changes are applied to all the fabrics that are previously discovered. Click Add to begin managing this fabric.
Removing FabricsYou can remove single or multiple fabrics from the Cisco DCNM Web Client.
Step 1 Step 2
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
Check the check box next to the fabric that you want to remove and click Remove to discontinue data collection for that fabric.
Editing a Fabric You can edit a fabric from Cisco DCNM Web Client.
Step 1 Step 2
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
Check the check box next to the fabric that you want to edit and click Edit. You see the Edit Fabric dialog box. Enter a new fabric name, username and password, privacy and specify how you want DCNM Web Client to manage the fabric by selecting one of the status options. (Optional) Check the SNMPV3 check box. If you check SNMPV3, the Community field change to Username and Password. You must enter your username and password. Change the fabric management state to Managed, Unmanaged, or Managed Continuously. Click Apply to save the changes.
Note
Moving a FabricYou can move a fabric from Cisco DCNM Web Client.
Step 1 Step 2 Step 3
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
Select the fabrics from the fabric table. Click Move Fabrics to another Federation Server or Move LAN Tasks to another DCNM Server. Select the fabrics that need to be moved and click Move Fabric. In the Move Fabrics to another Federation server dialog box, select the DCNM server where the fabrics will be moved. The server drop-down list will list only the active servers. In the Move LAN Tasks to another DCNM Server dialog box, enter the LAN tasks that need to be moved and specify the DCNM server. Note the following:
Step 4
This feature is only available on the federation setup and the Move Fabric is only displayed in the federation setup screen. You can move the fabrics from a sever that is down to an active server. The management state will remains the same.
2-45
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
You see the list of VMware servers (if any) that are managed by Cisco DCNM-SAN in the table. Click Add. You see the Add VMware dialog box. Enter the seed switch IP address for this VMware server. Enter the username and password for this VMware server. Click Add to begin managing this VMware server.
Step 2
DETAILED STEPS
Step 1 Step 2
From the menu bar, choose Admin > General > Data Sources. Check the check box next to the VMware server that you want to remove and click Remove to discontinue data collection for that VMware server.
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
Check the check box next to the VMware server that you want to edit and click Edit. You see the Edit VMware dialog box. Enter a new VMware name, username and password, privacy and specify how you want DCNM Web Client to manage the fabric by selecting one of the status options. Click Apply to save the changes.
Step 3 Step 4
2-46
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 1 Step 2 Step 3
DETAILED STEPSFrom the menu bar, choose Admin > General > Data Sources.
Check the check box next to the VMware that you want to rediscover. Click Rediscover.
DETAILED STEPSFrom the menu bar, choose Admin > General > Status.
You see a table of services per server and the status of each. Select the services that you want to start, restart, or stop. Click Start or Stop. The selected services are started, restarted, or stopped.
Step 2 Step 3
Viewing a vPC
The virtual port channel (vPC) feature enables you to view the links that are physically connected to different devices as a single port channel. A vPC is an extended form of a port channel. A vPC allows you to create redundancy and increase bisectional bandwidth by enabling multiple parallel paths between nodes and allowing load balancing traffic. Traffic is distributed among two single device vPC end points. If there is an inconsistency in the vPC configurations, the vPC does not function correctly. The Cisco DCNM Web Client helps you to identify the inconsistent vPCs and resolve the inconsistencies in each vPC or in all vPCs.
Step 1
DETAILED STEPSFrom the menu bar, choose Health> Virtual Port Channels (vPC).
Cisco DCNM Web Client displays both the consistent and inconsistent vPCs.
Note
The vPC inconsistency page displays inconsistencies only for the devices that have required Cisco DCNM licenses installed on them. The devices that do not have Cisco DCNM LAN license installed on them do not appear on this page. Table 2-7 displays the following vPC configuration details in the data grid view.
2-47
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 2-7
Description vPC ID. You can view all the multichassis vPC end points and corresponding peer switches for each vPC ID. Domain ID of the vPC peer switches.
Multi-chassis vPC End- Point Device Details of the corresponding to peer single chassis primary vPC end point. Port Channel ID Primary vPC peer link Device Port Channel ID Device Name Secondary vPC peer link Device Consistency Single port channel that is connected to two single chassis vPC end points. Details of the corresponding multichassis vPC end points. Single port channel that is connected to two single chassis vPC end point. Hostname of the vPC peer switches. Details that correspond to the peer single chassis secondary vPC end points. Configuration consistency between vPC peer port channels and vPC port channels. The valid values are Consistent and Inconsistent. Configuration consistency between vPC peer switches that form a peer link. Configuration consistency between vPC peer port channels.
Global vPC
You can view the vPC inconsistencies from Cisco DCNM Web Client.
Step 1 Step 2
DETAILED STEPSFrom the menu bar, choose Health > Virtual Port Channels (vPC).
Click on the specific cell to view the global or vPC inconsistencies. A popup window displays the inconsistencies between the parameters. All the conflicts in the configuration for the vPC primary device and the secondary device are displayed in red.
2-48
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSFrom the menu bar, choose Health > Virtual Port Channels (vPC).
Click on the specific cell to view the global or vPC inconsistencies. Click Auto Resolve Conflicts. The configuration parameters on the secondary device are synchronized with the primary vPC device.
Step 2
Choose a search option by clicking on an option. By default, Cisco DCNM Web Client searches for a device by name.
Note
The Search Indexer automatically runs every two hours. If you discover a new device by using Cisco DCNM, the newly discovered device is reflected in the search result only after two hours from the time of discovery. To manually run the Search Indexer, go to Admin > General > Status and click the (Re) start Service icon in the Actions column.
Step 3
Enter a keyword and click the right arrow or press Enter. The Search window appears. See Figure 2-9.
2-49
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-9 Search Window
Search results are of two types: Inventory and Performance. For more information about the search types, see Table 2-8.
Table 2-8 Search Types
Search Result Category Inventory Inventory Inventory Inventory Inventory Inventory Inventory Inventory Inventory Performance Performance Performance
Step 4
Search Result Entity Type Switch: SAN/LAN Switch module: SAN/LAN Inter-Switch Link (ISL) Enclosure: host Enclosure: storage VSAN Zone End device Virtual machine (VM) ISL End device Flow
Search Landing Page Switch Dashboard (a SAN or LAN Switch) Switch Dashboard Inventory ISL Page Host Dashboard Storage Dashboard Inventory VSAN page Inventory Zone Page Inventory End Device Page Host Dashboard Performance ISL Page Performance End Device Page Performance Flow Page
From the Search window, click on the device that you want to view. The Cisco DCNM Web Client navigates you to the corresponding page.
2-50
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
If you click the Performance button, and choose an item, Cisco DCNM Web Client navigates you to the Performance page.
DETAILED STEPSFrom the menu bar, choose Admin > General > Logs.
You see a list of viewable logs in the left column. Click a log file to view it.
Step 2
DETAILED STEPSFrom the menu bar, choose Admin > General > SFTP Credentials.
You see the SFTP credentials page. In the SFTP Username field, enter the username. In the SFTP Password field, enter the password. In the Root Directory field, enter the root directory path. From the Verification Switch field, select the switch. Click Apply to apply the configuration. Click Apply and Verify to apply and verify the configuration.
Viewing Events
Beginning with Cisco NX-OS Release 6.x, you can view the events and syslogs in Cisco DCNM Web Client.
Note
Beginning with Cisco NX-OS Release 6.x, all events and syslogs are displayed on the events page.
2-51
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 1
Viewing Events
You can view the events and syslog from Cisco DCNM Web Client.
Step 1
Icon
Description Mark selected row(s) as Acknowledged. Mark selected row(s) as Unacknowledged. Delete selected row(s). Show or Hide column search filters. Prints selected row(s). Exports selected row(s)
To delete all events from the server database, right-click on the event table and choose Delete All Events from the menu. To copy row(s) from the event table, right-click on the event table row and choose Copy Row Selection from the menu. To copy a cell from the event table row, right-click on the cell and choose Copy Current Cell from the the menu. To display the column filters of the event page, click the Show Filter icon. You can view events by the acknowledgment, switch, severity, facility, type, first-last seen, and descriptive text. Any new or updated events are displayed as a message in the Events panel. Refresh the page to view the new or updated event.
2-52
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSFrom the menu bar, choose Admin > Events > Registration.
Select a fabric to display registration information for that fabric. You see the Registration window showing the registration information for the selected fabric. (Optional) Click the Print icon or the Export Report icon for a copy of the information.
Step 3
Adding Notification Forwarding, page 2-53 Removing Notification Forwarding, page 2-54
Note
DETAILED STEPSCisco DCNM Web Client forwards fabric events through e-mail or SNMPv1 traps.
From the menu bar, choose Admin > Events > Forwarding. Click Add. You see the Add Notification dialog box . In the Forwarding Method, choose either E-Mail or Trap. If you choose Trap, a Port field is added to the dialog box. In the Address field, enter the IP address. From the Scope drop-down list, choose the fabric or LAN group for notification. In the VSAN Scope, choose either All or List. From the Event Type drop-down list, choose an event type or choose Syslog Facility and Type. Check the Storage Ports Only check box to select storage ports only. From the Minimum Severity drop-down list, select the severity level of the messages to receive. Click Add to add the notification.
Step 1 Step 2
Note
The minimum Severity option is available only if the Event Type is set to All.
Note
The traps sent by Cisco DCNM correspond to the severity type followed by a text description:
trap type(s) = 40990 (emergency) 40991 (alert) 40992 (critical) 40993 (error) 40994 (warning) 40995 (notice) 40996 (info) 40997 (debug)textDescriptionOid = 1, 3, 6, 1, 4, 1, 9, 9, 40999, 1, 1, 3, 0
2-53
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSFrom the menu bar, choose Admin > Events > Forwarding.
Check the check box in front of the notification that you want to remove. Click Remove.
DETAILED STEPSFrom the menu bar, choose Admin > Events > EMC CallHome.
Check the Enable check box to enable this feature. Check the check box to select the fabrics next to the fabric you want to select. Enter the general e-mail information. Click the Apply to update the e-mail options. Click Apply and Test to update the e-mail options and test the results.
DETAILED STEPSFrom the menu bar, choose Admin > Management Users > Local.
You see the Local Database page. Click Add. You see the Add User dialog box. Enter the username in the Username field.
Step 2
Step 3
Note
The username guest is a reserved name (case insensitive). The guest user can only view reports. The guest user cannot change the guest password, or access the Admin options in DCNM Web Client.
Step 4 Step 5
From the Role drop-down list, select a role for the user. In the Password field, enter the password.
2-54
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 6 Step 7 Step 8
In the Confirm Password field, enter the password again. Click Add to add the user to the database. Repeat Steps 3 through 7 to continue adding users.
Removing a User
Step 1 Step 2
DETAILED STEPSFrom the menu bar, choose Admin > Management Users > Local.
Check the check box next to the user(s) that you want to remove and click Remove.
DETAILED STEPSFrom the menu bar, choose Admin > Management Users> Remote AAA.
The AAA properties configuration page appears. See Figure 2-10.
2-55
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-10 LDAP Configuration for the Remote AAA
Click LDAP from the options that are given for the Auth Mode. In the Host field, enter the DNS address of the host. Click Test to test the AAA server. A dialog box prompts you to enter your username and password. See Figure 2-11.
Figure 2-11 Test AAA Server Authentication
Step 5 Step 6
Enter a valid username and password and then click Test. Click Close to cancel the test. The dialog box appears if the AAA server test is successful. See Figure 2-12.
2-56
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-12 AAA Server Test Successful
The LDAP Authentication Failed dialog box appears if the AAA server test fails. See Figure 2-13.
Figure 2-13 LDAP Authentication Failure
In the Port field, enter a port number. (Optional) Check the SSL Enabled check box. In the Base DN field, enter the base domain name (DN). In the Filter field, enter filters. Choose an option for determination of role by either Attribute or Admin Group Name to determine a role. In the Role Admin Group field, enter the name of the role. In the Map To DCNM Role field, enter the name of role that is be mapped. Click Apply to apply the LDAP configuration.
DETAILED STEPSFrom the menu bar, choose Admin > Management Users > Clients.
You see the Clients page. Check the check box next to the client that you want to disconnect. Click Disconnect.
Step 2 Step 3
2-57
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSFrom the main menu bar, choose Admin > Performance > Collection.
The PM Collection page appears. See Figure 2-14.
Figure 2-14 Performance Collection
You can globally turn on or off the threshold and change the threshold from this page. In addition, from the performance collection page, you can do the following:
Enable or disable the threshold. By default, the threshold is disabled. Enable or disable the threshold ISL-only flag. By default, the threshold ISL is enabled. Change the critical and warning threshold. Add or remove the SAN fabric information. Change the SAN performance collection policy for each fabric. By default, ISLs, hosts and storage are enabled. Add or remove the LAN switches into or from the collection. Change the LAN PM collection policy. By default, trunks are enabled.
SAN Collection
For the LAN, click the Check All check box to add all fabrics. When you select a fabric, the default settings of the fabric are displayed. In the default view, ISLs, hosts storage, FC Flows, and FC Ethernet are displayed. You can select a fabric and modify the settings.
2-58
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
LAN Collection
For the LAN, you can change the LAN PM policy for all DCNM licensed Ethernet switches. Click on a group node to select all Ethernet switches.
Fabric Extender
If a Cisco Nexus 2000 Series switch is attached to a Cisco Nexus 5000 Series switch or Cisco Nexus 7000 Series switch as a Fabric Extender (FEX) and the attached switch is DCNM licensed, the PM collects tx, rx, and error discard information for all FEX interfaces that are functional. Figure 2-15 displays how the PM collects information about a FEX interface.
Figure 2-15 The FEX Interface
For more information on Cisco DCNM Licensing, see the Cisco DCNM Installation and Licensing Guide, Release 6.x.
DETAILED STEPSFrom the menu bar, choose Admin > Performance > Databases.
You see the Performance Database (collection interval) page. In the top row of the Days column, enter the number of days to collect samples at 5-minute intervals. In the second row of the Days column, enter the number of days to collect samples at 30-minute intervals. In the third row of the Days column, enter the number of days to collect samples at 2-hour intervals. In the bottom row of the Days column, enter the number of days to collect samples at 1-day intervals.
Note
As of Cisco SAN-OS Release 3.1(1) and later releases, you can configure the sampling interval for ISLs. Select a sampling interval from the ISLs drop-down list.
2-59
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 6
Click Apply to apply your changes, or click Defaults to reset the file sizes to the default values. If you are applying new values, or if the current values are not the default values, you see a message indicating that the conversion of the RRD files take a certain amount of time and that the database is unavailable until then. The time that it takes depends on the difference between the old and new values.
Note
The system allows you to convert data, one process at a time. When you start converting the data, the Apply and Default buttons change to Refresh and Cancel so that another process cannot be inadvertently started. The display is the same for all browsers that access the server during this time. Click Refresh to view the latest progress. Click Cancel to cancel the process of converting the data. If the job is successfully canceled, you see the Apply and Default buttons again. If the cancel job is not successful, you see a message indicating that the cancellation has failed. If you want to perform this procedure, perform it before collecting a lot of data because data conversion can take a long time.
DETAILED STEPSFrom the menu bar, choose Admin > Performance > Thresholds.
You see the Thresholds page . Follow these steps to configure thresholds using absolute values:
a.
Step 2
To configure conditions for sending Critical notifications, check the Generate Critical check box. In the ...when traffic exceeds field, enter a number (from 5 to 95) to indicate the percentage at which the Critical notification is sent. For example, entering 10 causes a notification to be sent when traffic at any given time exceeds 10 percent of the capacity. To configure conditions for sending Warning notifications, check the Generate Warning check box. In the ...when traffic exceeds field, enter a number (from 5 to 95) to indicate the percentage at which the Warning notification is sent. For example, entering 9 causes a notification to be sent when traffic at any given time exceeds 9 percent of the capacity.
b.
Step 3
Click Apply.
DETAILED STEPSFrom the menu bar, choose Admin > Performance > Others.
You see the Others page.
2-60
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
Click Add. You see the Add SNMP Statistic dialog box. From the Switch table, select the switch for which you want to add other statistics. From the SNMP OID drop-down list, select the OID. In the Display Name box, enter a new name. From the Type drop-down list, select the type. Click Add to add this statistic.
Adding Switch Groups, page 1-67 Adding a Member to a Group, page 2-63 Moving a Member, page 2-64 Renaming a Group, page 2-64 Deleting a Group or a Member of a Group, page 2-64
DETAILED STEPSFrom the menu bar, choose Admin > General > Switch Groups. See Figure 2-17.
2-61
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-17 Admin > General > Switch Groups
Step 1 Step 2
Click the Add Group icon or press the Insert key. A field appears that allows you to enter the name for the switch group. See Figure 2-18.
Figure 2-18 Naming a Switch Group Field
Note Step 3
The Insert key does not work unless you highlight the group table first.
Enter the name of the switch group and click outside the text field or press the Return key to complete adding the switch group. Press the Esc key to discard the text input and exit.
Note
The switch group name validation and the maximum tree depth is 10.
2-62
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
If you do not choose a parent group before adding a new switch group, the new group is added on the top of the hierarchy.
Note
In the Add Member dialog, all fabrics and the Ethernet switches are displayed under SAN and LAN radio buttons. You can select a range or multiple devices by pressing the Ctrl-Click or Shift-Click.
Step 1
DETAILED STEPSChoose the switch group to which you want to add the selected members and then click
the Move Switch/Fabric to Selected Group icon. The Add Member to..dialog box appears. See Figure 2-19.
Figure 2-19 The Add Member to... Dialog Box
Note
The members listed in the Add Member to... dialog box depends on the type of the group that you select. For example, if a LAN domain is selected, the dialog box lists the Ethernet switches only. Choose the members from the Default_LAN or the Default_SAN and click Add. Selected members are added to the group. Highlight the switch group to which you want to add the selected members to and click Apply. The selected member(s) are added to the group.
Step 2
Step 3
2-63
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 4
Click Close to exit from the Move (LAN/SAN) Member dialog box.
Moving a Member
You can move the fabrics or Ethernet switches from one switch group to another from the Cisco DCNM Web Client.
Step 1
DETAILED STEPSChoose the members that you want to move out of a group and click the Move Selected
Switch/Fabric to group icon. The Move LAN/SAN Member dialog box appears.
Note
You must select members from the same domains. For example, LAN domains. If you select members from different domains, the Move Selected Switch/Fabric to group icon remains grayed out. You can move the members from different groups to only one target group at a time.
Step 2
Highlight the target group that you want the members to move in to and click Apply.
Renaming a Group
You can rename a switch group from Cisco DCNM Web Client.
Step 1 Step 2
DETAILED STEPSDouble-click on the switch group name that you want to rename.
Enter a new name to rename the group.
Note Step 3
The name of the group cannot contain any of these special characters: ()<>,;:\\\[]`~!#$% *=}|/?. Press the Return key to apply changes or press the Esc key to discard the modification.
DETAILED STEPSChoose the switch group or a member of a group that you want to remove.
Click the Delete icon or press the Delete key. A dialog box prompts you to confirm the deletion of the switch group or the member of the group. See Figure 2-20.
2-64
OL-25174-02
Chapter 2
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 2-20 Deleting Switch Group Dialog Box
Step 3
Viewing Host Enclosures, page 2-65 Viewing Hosts, page 2-65 Viewing the Host Summary, page 2-66
Step 2
Viewing Hosts
Beginning with Cisco NX-OS Release 6.x, you can view and search the network servers that are connected to the Cisco NX-OS devices. Cisco DCNM extends the fabric visibility up to the server and allows you to discover and search the end devices that are attached to the network.
Note
Beginning with Cisco NX-OS Release 6.x, Server Credentials, Servers, and Static Server-Adapter Mapping are no longer available.
2-65
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
Note
If you filter by hosts or enclosures, you can click a host in the resulting table to see host enclosure performance, a list of hosts, a list of hosts to which your device is connected, and the connection paths. This action allows you to see performance statistics for hosts and enclosures. You can also filter by end devices or by port groups to view aggregate information for those port groups, such as peak and average usage.
Viewing Storage
Step 1
Step 2 Step 3
Creating a Local Certificate, page 2-66 Creating a Certificate Request, page 2-67 Modifying Cisco DCNM Web Client to Use SSL, page 2-69
DETAILED STEPSSet up a keystore to use a self-signed certificate (local certificate). From the command
line, enter the following command:
%JAVA_HOME%/bin/keytool -genkey -alias tomcat -keyalg RSA -keystore "C:\Program Files\Cisco Systems\dcm\jboss-4.2.2.GA\server\fm\conf\fmserver.jks"
2-66
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
Enter your name, organization, state, and country. Enter change it when prompted for a keystore password. If you prefer to use your own password, do not forget to change the keystorepass attribute in the server.xml file. When prompted for a key password, press Enter or use the same password as the keystore password.
Note
You can now follow the steps in the next section for modifying DCNM Web Client to use SSL.
To obtain a certificate from the Certificate Authority of your choice, you must create a Certificate Signing Request (CSR). The CSR is used by the certificate authority to create a certificate that identifies your website as secure.
You must enter the domain of your website in the field first and last name in order to create a working certificate.
Step 2
Now you have a file called certreq.csr. The file is encoded in PEM format. You can submit it to the certificate authority. You can find instructions for submitting the file on the Certificate Authority website. You will receive a certificate.
Step 3 Step 4
After you have your certificate, you can import it into your local keystore. You must first import a Chain Certificate or Root Certificate into your keystore. You can then import your certificate. Download a Chain Certificate from the Certificate Authority where you obtained the certificate:
Import the Chain Certificate into your keystore by entering the keytool -import -alias root -keystore " C:\Program Files\Cisco Systems\dcm\jboss-4.2.2.GA\server\fm\conf\fmserver.jks" -trustcacerts -file filename_of_the_chain_certificate command.
2-67
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Import the new certificate in X509 format by entering the keytool -import -alias tomcat -keystore " C:\Program Files\Cisco Systems\dcm\jboss-4.2.2.GA\server\fm\conf\fmserver.jks" -trustcacerts -file your_certificate_filename command.
2-68
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPSStop Cisco DCNM Web Client if you have already launched it. If you have installed the
Cisco DCNM Web Client on Windows, you can stop the service using Windows Services under Administrative Tools.
Step 2
Use a text editor to open \jboss-4.2.2.GA\server\fm\deploy\jboss-web.deployer\server.xml from the directory where DCNM Web Client is installed. You see the following lines in the beginning after some copyright information:
<Connector className="org.apache.catalina.connector.http.HttpConnector" port="80" minProcessors="5" maxProcessors="75" enableLookups="false" redirectPort="8443" acceptCount="10" debug="0" connectionTimeout="60000"/> <!-- Define an SSL HTTP/1.1 Connector on port 8443 --> <!-<Connector className="org.apache.catalina.connector.http.HttpConnector" port="8443" minProcessors="5" maxProcessors="75" enableLookups="true" acceptCount="10" debug="0" scheme="https" secure="true"> <Factory className="org.apache.catalina.net.SSLServerSocketFactory" clientAuth="false" protocol="TLS"/> </Connector> -->
Step 3
Comment the first <Connector> element and uncomment the second one. Note that the port changes from 8443 to 443 and keystore and keypass are added. Your file should look like the following example:
<!-- A HTTP/1.1 Connector on port 8080 <Connector port="80" maxThreads="250" protocol="HTTP/1.1" strategy="ms" maxHttpHeaderSize="8192" emptySessionPath="true" server="Apache" enableLookups="false" redirectPort="8443" acceptCount="100" connectionTimeout="20000" disableUploadTimeout="true" allowTrace="false"/> --> <!-- Add this option to the connector to avoid problems with .NET clients that don't implement HTTP/1.1 correctly restrictedUserAgents="^.*MS Web Services Client Protocol 1.1.4322.*$" --> <!-- A AJP 1.3 Connector on port 9009 --> <Connector port="9009" emptySessionPath="true" enableLookups="false" redirectPort="8443" protocol="AJP/1.3"/> <!-- SSL/TLS Connector configuration using the admin devl guide keystore --> <Connector port="443" protocol="HTTP/1.1" SSLEnabled="true" maxThreads="100" strategy="ms" maxHttpHeaderSize="8192" emptySessionPath="true" server="Apache" scheme="https" secure="true" clientAuth="false" sslProtocol = "TLS" securityDomain="java:/jaas/encrypt-keystore-password" SSLImplementation="org.jboss.net.ssl.JBossImplementation" allowTrace="false"/>
Step 4 Step 5
Save this file. Create a keyword password from the command line by navigating to C:\Program Files\Cisco Systems\dcm\fm\bin, entering Encrypter.bat ssl, and then entering changeit as the password.
2-69
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 6
Note
If you restart Cisco DCNM-SAN Server with SSL enabled, you must restart Cisco DCNM Web Client. If you want to stop and restart Cisco DCNM-SAN Server with SSL disabled, you must restart Cisco DCNM Web Client.
2-70
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-71
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-72
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-73
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-74
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-75
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-76
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-77
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-78
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-79
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-80
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-81
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-82
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-83
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-84
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-85
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-86
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-87
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-88
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-89
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-90
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-91
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-92
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-93
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-94
OL-25174-02
Chapter 2
Cisco DCNM Web Client Using Cisco DCNM Web Client with SSL
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-95
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
2-96
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
PA R T
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
Information About Cisco DCNM-SAN Server, page 3-1 Licensing Requirements For Cisco DCNM-SAN Server, page 3-2 Installing and Configuring Cisco DCNM-SAN Server, page 3-2 Managing a Cisco DCNM-SAN Server Fabric, page 3-6 Modifying Cisco DCNM-SAN Server, page 3-8 Server Federation, page 3-11 Additional References, page 3-13
Multiple fabric management DCNM-SAN Server monitors multiple physical fabrics under the same user interface. This facilitates managing redundant fabrics. A licensed DCNM-SAN Server maintains up-to-date discovery information on all configured fabrics so device status and interconnections are immediately available when you open the DCNM-SAN Client.
3-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Continuous health monitoringMDS health is monitored continuously, so any events that occurred since the last time you opened the DCNM-SAN Client are captured. Roaming user profilesThe licensed DCNM-SAN Server uses the roaming user profile feature to store your preferences and topology map layouts on the server, so that your user interface will be consistent regardless of what computer you use to manage your storage networks.
Note
You must have the same release of Cisco DCNM-SAN Client and Cisco DCNM-SAN Server.
Note
You will not be able to manage a SAN fabric if the DCNM-SAN Server is going through a IP NAT firewall to access the SAN fabric. All the IP addresses that are discovered in a SAN fabric must be directly reachable by the DCNM-SAN Server.
Prior to running Cisco DCNM-SAN Server, you should create a special Cisco DCNM-SAN administrative user on each switch in the fabric or on a remote AAA server. Use this user to discover your fabric topology.
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4 Step 5
Install Cisco DCNM-SAN Client and Cisco DCNM-SAN Server on your workstation. See the Installing Cisco DCNM-SAN Server section on page 3-3. Log in to DCNM-SAN. Set Cisco DCNM-SAN Server to continuously monitor the fabric. See the Managing a Cisco DCNM-SAN Server Fabric section on page 3-6. Repeat Step 2 through Step 3 for each fabric that you want to manage through Cisco DCNM-SAN Server. Install DCNM-SAN Web Server. See the Verifying Performance Manager Collections section on page 3-5.
3-2
OL-25174-02
Chapter 3
Configuring Cisco DCNM-SAN Server Installing and Configuring Cisco DCNM-SAN Server
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 6
Verify Performance Manager is collecting data. See the Verifying Performance Manager Collections section on page 3-5.
Note
You can have only one instance of Cisco DCNM-SAN Server running on a computer. If you have a DCNM-SAN Standalone version on your computer, you may need to uninstall it before you install Cisco DCNM-SAN Server. To download the software from Cisco.com, go to the following website: http://cisco.com/cgi-bin/tablebuild.pl/mds-fm
Note
If you are upgrading from an earlier version to 5.0(1a) or later, that is configured with HTTPS to use your own self-provisioned or a third-party issued SSL certificate, make sure that you set the keystore password and then restart the DCNM-SAN Server. To set the keystore password, run $INSTALLDIR/dcm/fm/bin encrypter.bat ssl.
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4
Click the Install Management Software link. Choose Management Software > Cisco DCNM-SAN. Click the Installing DCNM-SAN link. Click the FM Installer link. You see the welcome message in the Cisco DCNM-SAN Installer window. Click the Custom radio button, and then click Next to begin installation. Check the I accept the terms of the License Agreement check box, and then click Next. You see the Install Options dialog box.
Step 5 Step 6
3-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 7 Step 8
Click the Cisco DCNM-SAN Server (Licensed) radio button to install the server components for Cisco DCNM-SAN Server. Click Add server to an existing server federation to add the server to a federation.
Note
You may need to add the following line in the pg-hba.conf file under # IPv4 local connections in order to allow remote hosts to connect to PostgreSQL database: host all all 0.0.0.0/0 md5
After adding, save the configuration file, restart the PostgreSQL database before you install the second server node.
Note
If you are joining more then three DCNM-SAN Servers in a federation, you need to use an Oracle database with the following settings.
C:\Documents and Settings\Administrator>sqlplus /nolog SQL*Plus: Release 10.2.0.1.0 - Production on Wed Jan 6 17:19:32 2010 Copyright (c) 1982, 2005, Oracle. All rights reserved. SQL> connect / as sysdba; Connected. SQL> alter system set processes=150 scope=spfile; System altered. SQL> alter system set open_cursors=500 scope=spfile; System altered. SQL> shutdown immediate; Database closed. Database dismounted. ORACLE instance shut down. SQL> startup; ORACLE instance started. Total System Global Area 805306368 Fixed Size 1453836 Variable Size 218714356 Database Buffers 583008256 Redo Buffers 2129920 Database mounted. Database opened. SQL> show parameter processes; Total System Global Area 805306368 Fixed Size 1453836 Variable Size 218714356 Database Buffers 583008256 Redo Buffers 2129920 Database mounted. Database opened. SQL> show parameter processes; NAME -----------------------------------aq_tm_processes db_writer_processes gcs_server_processes job_queue_processes log_archive_max_processes
VALUE -----------------------------0 4 0 4 2
3-4
OL-25174-02
Chapter 3
Configuring Cisco DCNM-SAN Server Installing and Configuring Cisco DCNM-SAN Server
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
processes integer 100
Step 9 Step 10
Select an installation folder on your workstation for Cisco DCNM-SAN. On Windows, the default location is C:\Program Files\Cisco Systems. Click Next. You see the Database Options dialog box.
Step 11
Click the radio button for either Install PostgreSQL or Use existing DB to specify which database you want to use. If you choose Install PostgreSQL, accept the defaults and enter a password. The PostgreSQL database will be installed.
Note
If you choose to install PostgreSQL, you must disable any security software you are running, because PostgreSQL may not install certain folders or users.
Note
Before you install PostgreSQL, remove the cygwin/bin from your environment variable path if Cygwin is running on your system.
Step 12 Step 13
If you select Use existing DB, click the radio button for either PostgreSQL 8.1/8.2 or Oracle10g. Click Next in the Database Options dialog box. You see the Configuration Options dialog box. Click Install to install Cisco DCNM-SAN Server.
Step 14
If you are evaluating one of these Cisco DCNM-SAN Server features and want to stop the evaluation period for that feature, you can do that using Device Manager.
3-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Choose Server > Admin. You see the Control Panel dialog box with the Fabrics tab open.
Note
Note
You can preconfigure a user name and password to manage fabrics. In this instance, you should use a local switch account, not a TACACS+ server.
Step 2
Manage ContinuouslyThe fabric is automatically managed when Cisco DCNM-SAN Server starts and continues to be managed until this option is changed to Unmanage. ManageThe fabric is managed by Cisco DCNM-SAN Server until there are no instances of DCNM-SAN viewing the fabric. UnmanageCisco DCNM-SAN Server stops managing this fabric.
Step 3
Click Apply.
Note
If you are collecting data on these fabrics using Performance Manager, you should now configure flows and define the data collections.
Note
As of Cisco NX-OS Release 4.1(1b) and later, you can optionally encrypt the password in the server.properties and the AAA.properties files. The server properties file contains these nine general sections:
3-6
OL-25174-02
Chapter 3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
GENERALContains the general settings for the server. SNMP SPECIFICContains the settings for SNMP requests, responses, and traps. SNMP PROXY SERVER SPECIFICContains the settings for SNMP proxy server configuration and TCP port designation. GLOBAL FABRICContains the settings for fabrics, such as discovery and loading. CLIENT SESSIONContains the settings for DCNM-SAN Clients that can log into the server. EVENTSContains the settings for syslog messages. PERFORMANCE CHARTContains the settings for defining the end time to generate a Performance Manager chart. EMC CALL HOMEContains the settings for the forwarding of traps as XML data using e-mail, according to EMC specifications. EVENT FORWARD SETUPContains the settings for forwarding events logged by Cisco DCNM-SAN Server through e-mail.
The following server properties are added or changed in the Cisco DCNM-SAN Release 3.x and later.
SNMP Specific
snmp.preferTCPIf this option is set to true, TCP is the default protocol for Cisco DCNM-SAN Server to communicate with switches. By default, this setting is true. For those switches that do not have TCP enabled, Cisco DCNM-SAN Server uses UDP. The advantage of this setting is the ability to designate one TCP session for each SNMP user on a switch. It also helps to reduce timeouts and increase scalability.
Note
If you set this option to false, the same choice must be set in DCNM-SAN. The default value of snmp.preferTCP for DCNM-SAN is true.
Performance Chart
pmchart.currenttimeSpecifies the end time to generate a Performance Manager chart. This should only be used for debugging purposes.
server.callhome.enable Enables or disables EMC Call Home. By default, it is disabled. server.callhome.locationSpecifies the Location parameter. server.callhome.fromEmailSpecifies the From Email list. server.callhome.recipientEmailSpecifies the recipientEmail list. server.callhome.smtphostSpecifies the SMTP host address for outbound e-mail. server.callhome.xmlDirSpecifies the path to store the XML message files. server.callhome.connectTypeSpecifies the method to use to remotely connect to the server. server.callhome.accessTypeSpecifies the method to use to establish remote communication with the server. server.callhome.versionSpecifies the version number of the connection type. server.callhome.routerIpSpecifies the public IP address of the RSC router.
3-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Event Forwarding
server.forward.event.enableEnables or disables event forwarding. server.forward.email.fromAddressSpecifies the From Email list. server.forward.email.mailCCSpecifies the CC Email list. server.forward.email.mailBCCSpecifies the BCC Email list. server.forward.email.smtphostSpecifies the SMTP host address for outbound e-mail.
Deactivation
Note
In a federated server environment, you should not change Cisco DCNM-SAN Server properties by modifying server.properties file. You must modify the server.properties using web client menu Admin > Configure > Preferences.
Adding or Removing Cisco DCNM-SAN Server Users, page 3-8 Changing the Cisco DCNM-SAN Server Username and Password, page 3-9 Changing the DCNM-SAN Server Fabric Discovery Username and Password, page 3-9 Changing the Polling Period and Fabric Rediscovery Time, page 3-9 Using Device Aliases or FC Aliases, page 3-10
DETAILED STEPS
To add a Cisco DCNM-SAN Server user or to change the password for an existing user using DCNM-SAN, follow these steps:
Step 1 Step 2
Click the Local FM Users tab in the Control Panel dialog box. You see a list of DCNM-SAN users. Click New to add a user or click the user name and click Edit to change the password for an existing user. You see the FM User dialog box. Set the username and password for the new user and then click Apply.
Step 3
Step 1
Click the Local FM Users tab in the Control Panel dialog box. You see a list of DCNM-SAN users.
3-8
OL-25174-02
Chapter 3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2 Step 3 Step 4
Click the username you want to delete. Click Remove to delete the user. Click Yes to confirm the deletion or No to cancel it.
DETAILED STEPS
Step 1
Choose Server > Admin. You see the Control Panel dialog box with the Fabrics tab open. Set the Name or Password for each fabric that you are monitoring with Cisco DCNM-SAN Server. Click Apply to save these changes.
Step 2 Step 3
Click Server > Admin in Cisco DCNM-SAN. You see the Control Panel dialog box with the Fabrics tab open . Click the fabrics that have updated user name and password information. From the Admin listbox, select Unmanage and then click Apply. Enter the appropriate user name and password and then click Apply. For more information, see the Performance Manager Authentication section on page 4-4.
DETAILED STEPS
Step 1
Choose Server > Admin. You see the Control Panel dialog box with the Fabrics tab open.
3-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2 Step 3 Step 4
For each fabric that you are monitoring with Cisco DCNM-SAN Server, set the Polling Interval to determine how frequently Cisco DCNM-SAN Server polls the fabric elements for status and statistics. For each fabric that you are monitoring with Cisco DCNM-SAN Server, set the Rediscover Cycles to determine how often Cisco DCNM-SAN Server rediscovers the full fabric. Click Apply to save these changes.
Stop the Cisco DCNM-SAN Server. Change the following parameter in the $INSTALLDIR/conf/FMServer.conf. wrapper.app.parameter.4=127.0.0.1 Change the following parameter in the $INSTALLDIR/conf/server.properties. server.bindaddrs = 127.0.0.1 Enter the following command to assign a new IP address.
run $INSTALLDIR/bin/PLMapping.bat -p newipaddress 0
Step 3
Step 4
Assume $INSTALLDIR is the top directory of DCNM-SAN installation. The above command is for single server instance, where 0 is the server ID.
DETAILED STEPS
Step 1
Choose Server > Admin. You see the Control Panel dialog box with the Fabrics tab open. For each fabric that you are monitoring with Cisco DCNM-SAN Server, check or uncheckthe FC Alias check box. If you check the FC Alias checkbox, DCNM-SAN will use FC Alias from DCNM-SAN Client. If you uncheck the FC Alias checkbox, DCNM-SAN will use global device alias from DCNM-SAN Client.
Step 2
Step 3
3-10
OL-25174-02
Chapter 3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Server Federation
Server Federation is a distributed system that includes a collection of intercommunicated servers or computers that is utilized as a single, unified computing resource. With Cisco DCNM-SAN Server Federation, you can communicate with multiple servers together in order to provide scalability and easy manageability of data and programs running within the federation. The core of server federation includes several functional units such as Cisco DCNM-SAN Server, embedded web servers, database and DCNM-SAN Client that accesses the servers. The Cisco DCNM-SAN Server in the federation uses the same database to store and retrieve data. The database is shared among different servers to share common information. A DCNM-SAN Client or DCNM-SAN Web Client can open fabrics from the Cisco DCNM-SAN Server using the mapping table. A fabric can be moved from one logical server to another. A logical server also can be moved from one physical machine to another machine.
Restrictions
You cannot upgrade more than one Cisco DCNM-SAN Server in an existing federation. If you choose to do so, you may not be able to migrate the Performance Manager statistics and other information on that server. You may require to synchronize the time on all the DCNM-SAN Servers in a federated server environment.
DETAILED STEPS
Step 1
Choose Server > Admin. You see the Control Panel. Select the fabric that you want to move to a different server and then click Move. You see the Move Fabric dialog box. You see the fabrics that you selected in the Fabrics to Move list box. From the Move To Server drop-down list select the server you want to move the fabric to. Click Move.
Step 2
Step 3 Step 4
3-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
Click Discover. You see the Discover New Fabric dialog box. In the Seed Switch list box, enter the IP Address of the seed switch. In the User Name field, enter the username. In the password field, enter the password. From the Auth-Privacy drop-down list, choose the privacy protocol you want to apply. To open the selected fabric in a different server, select the server ID from the Server drop-down list. Click Discover.
Note
You may receive an error message when you discover a fabric in a federation while another Cisco DCNM-SAN Server is joining the federation. You can discover the fabric on after the installation or upgradation is complete.
Choose Server > Admin. Click the Connected Clients tab. You see the Control Panel.
Choose Server > Admin. Click the Servers tab. You see the Control Panel.
3-12
OL-25174-02
Chapter 3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Additional References
Server Federation is a licensed feature. For more information on Cisco DCNM-SAN Server Licensing, see Cisco MDS 9000 Family NX-OS Licensing Guide. For more information on deploying Cisco DCNM-SAN Server in a federation, see Cisco Fabric Manager Server Federation Deployment Guide.
3-13
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
3-14
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
Information About Cisco DCNM-SAN Authentication, page 4-1 Best Practices for Discovering a Fabric, page 4-3 Performance Manager Authentication, page 4-4 Cisco DCNM-SAN Web Client Authentication, page 4-4
Cisco DCNM-SAN Client Cisco DCNM-SAN Server Performance Manager Interconnected fabric of Cisco MDS 9000 switches and storage devices AAA server (optional)
4-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 4-1 Cisco DCNM-SAN Authentication Example
AAA server
Local database
Administrators launch Cisco DCNM-SAN Client and select the seed switch that is used to discover the fabric. The user name and password used are passed to Cisco DCNM-SAN Server and used to authenticate to the seed switch. If this user name and password are not a recognized SNMP user name and password, either Cisco DCNM-SAN Client or Cisco DCNM-SAN Server opens a CLI session to the switch (SSH or Telnet) and retries the user name and password pair. If the user name and password are recognized by the switch in either the local switch authentication database or through a remote AAA server, then the switch creates a temporary SNMP user name that is used by Cisco DCNM-SAN Client and server.
Note
You may encounter a delay in authentication if you use a remote AAA server to authenticate Cisco DCNM-SAN or Device Manager.
Note
You must allow CLI sessions to pass through any firewall that exists between Cisco DCNM-SAN Client and Cisco DCNM-SAN Server.
Note
We recommend that you use the same password for the SNMPv3 user name authentication and privacy passwords as well as the matching CLI user name and password.
4-2
OL-25174-02
Chapter 4
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Caution
If the Cisco DCNM-SAN Servers CPU usage exceeds 50 percent, it is recommended that you switch to a higher CPU-class system. We recommend that you use these best practices for discovering your network and setting up Performance Manager. This ensures that Cisco DCNM-SAN Server has a complete view of the fabric. Subsequent Cisco DCNM-SAN Client sessions can filter this complete view based on the privileges of the client logging in. For example, if you have multiple VSANs in your fabric and you create users that are limited to a subset of these VSANs, you want to initiate a fabric discovery through Cisco DCNM-SAN Server using a network administrator or network operator role so that Cisco DCNM-SAN Server has a view of all the VSANs in the fabric. When a VSAN-limited user launches Cisco DCNM-SAN Client, that user sees only the VSANs they are allowed to manage.
Note
Cisco DCNM-SAN Server should always monitor fabrics using a local switch account, do not use a AAA (RADIUS or TACACS+) server. You can use a AAA user account to log into the clients to provision fabric services.
Create a special Cisco DCNM-SAN administrative user name in each switch on your fabric with network administrator or network operator roles. Or, create a special Cisco DCNM-SAN administrative user name in your AAA server and set every switch in your fabric to use this AAA server for authentication. Verify that the roles used by this Cisco DCNM-SAN administrative user name are the same on all switches in the fabric and that this role has access to all VSANs. Launch Cisco DCNM-SAN Client using the Cisco DCNM-SAN administrative user. This step ensures that your fabric discovery includes all VSANs. Set Cisco DCNM-SAN Server to continuously monitor the fabric. Repeat Step 4 for each fabric that you want to manage through Cisco DCNM-SAN Server.
4-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
Click Server > Admin in Cisco DCNM-SAN. You see the Control Panel dialog box with the Fabrics tab open . Click the fabrics that have updated user name and password information. From the Admin listbox, choose Unmanage and then click Apply. Enter the appropriate user name and password and then click Apply. From the Admin listbox, choose Manage and then click Apply. To rediscover the fabric, click Open tab and check the check box(es) next to the fabric(s) you want to open in the Select column. Click Open to rediscover the fabric. Cisco DCNM-SAN Server updates its user name and password information. Repeat Step 3 through Step 7 for any fabric that you need to rediscover. Choose Performance > Collector > Restart to restart Performance Manager and use the new user name and password.
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4
Launch Cisco DCNM-SAN Web Client. Choose Admin > Management Users > Remote AAA to update the authentication used by Cisco DCNM-SAN Web Client. Set the authentication mode attribute to radius. Set the RADIUS server name, shared secret, authentication method, and ports used for up to three RADIUS servers.
4-4
OL-25174-02
Chapter 4
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 5
Launch Cisco DCNM-SAN Web Client. Choose Admin > Management Users > Remote AAA to update the authentication used by Cisco DCNM-SAN Web Client. Set the authentication mode attribute to tacacs. Set the TACACS+ server name, shared secret, authentication method, and port used for up to three TACACS+ servers. Click Modify to save this information.
Note
Cisco DCNM-SAN does not support SecureID because it is not compatible with SNMP authentication. Cisco DCNM-SAN uses the same login credentials for all the switches in a fabric. Since SecureID cannot be used more than once for authentication, Cisco DCNM-SAN will not be able to establish a connection to the second switch using a SecureID.
4-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
4-6
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
Information About DCNM-SAN Client, page 5-1 Cisco DCNM-SAN Client Quick Tour: Server Admin Perspective, page 5-2 Cisco DCNM-SAN Client Quick Tour: Admin Perspective, page 5-7 Launching Cisco DCNM-SAN Client, page 5-24 Setting Cisco DCNM-SAN Preferences, page 5-28 Network Fabric Discovery, page 5-30 Modifying the Device Grouping, page 5-31 Controlling Administrator Access with Users and Roles, page 5-32 Using Cisco DCNM-SAN Wizards, page 5-32 Cisco DCNM-SAN Troubleshooting Tools, page 5-33 Integrating Cisco DCNM-SAN and Data Center Network Management Software, page 5-34
Note
You must use the same release of Cisco DCNM-SAN Client and Cisco DCNM-SAN Server.
5-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
5-2
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Server Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 5-1 Cisco DCNM-SAN Main Window: Server Admin Perspective
1 2 3 4 5 6 7 8
Menu barProvides access to options that are organized by menus. ToolbarProvides icons for direct access to the most commonly used options on the File, Tools, and Help menus. Information paneDisplays information about whatever option is selected in the menu tree. Status Bar (right side)Shows the last entry displayed by the discovery process and the possible error message. Fabric paneDisplays a map of the network fabric, including switches, hosts, and storage. It also provides tabs for displaying log and event data. Status Bar (left side)Shows short-term transient messages, such as the number of rows displayed in a table. Physical Attributes paneDisplays a tree of available configuration tasks depending on the fabric, VSAN, or zone selected previously. Lists the switches in the logical selection. Logical Domains paneDisplays a tree of configured SAN, fabrics and user-defined groups.
5-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Menu Bar
The menu bar at the top of the Cisco DCNM-SAN main window provides options for managing and for controlling the display of information on the Fabric pane. Server admin will not have all the options that are available for SAN admin. The menu bar provides the following menus:
FileOpens a new fabric, rediscovers the current fabric, locates switches, sets preferences, prints the map. ViewChanges the appearance of the map (these options are duplicated on the Fabric pane toolbar). ToolsManages the Server and configuration using the FlexAttach virtual pWWN feature. HelpDisplays online help topics for specific dialog boxes in the Information pane.
Tool Bar
The Cisco DCNM-SAN main toolbar (specific to server admin) provides icons for accessing the most commonly used menu bar options as shown in Table 5-1.
Table 5-1 Cisco DCNM-SAN Client Main Toolbar
Icon
5-4
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Server Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
To select an option, click a folder to display the options available and then click the option. You see the table with information for the selected option in the Information pane. The Physical Attributes pane provides the following main folders:
SwitchesViews and configures hardware, system, licensing, and configuration files. InterfacesViews and configures FC physical, FC logical, VFC (FCoE), Ethernet, SVC, and PortChannel interfaces.
Information Pane
Use the Information pane to display tables of information associated with the option selected from the menu tree in the Logical Domains or Physical Attributes panes. The Information pane toolbar provides buttons for performing one or more of the operations shown in Table 5-2.
Table 5-2 Information Pane Toolbar
Icons
Displays a non-editable copy of the table in the Information pane in its own window, which you can move around the screen.
5-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Fabric Pane
Use the Fabric pane to display the graphical representation of your fabric. Table 5-1 explains the graphics you may see displayed, depending on which devices you have in your fabric. The bottom of the Fabric pane has the following tabs:
FabricWhen displaying multiple fabrics, each fabric has its own tab. You can switch between fabrics by clicking on their respective tabs. LogDisplays messages that describe Cisco DCNM-SAN operations, such as fabric discovery. EventsDisplays information about the SNMP traps received by the management station. This includes combination events as detected by discovery and important traps such as license, SNMP, and FICON.
Note
Fabric map display is based on what you select in the logical domain pane. When you select a fabric node, all the switches that belong to that fabric will be enabled. When you select the group node, all the switches that belong to the groups listed under that group node will be enabled. When you select only a group, all the switches that belong to the specific group will be enabled.
5-6
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
1 2 3 4 5
Menu barProvides access to options that are organized by menus. ToolbarProvides icons for direct access to the most commonly used options on the File, Tools, and Help menus. Information paneDisplays information about whatever option is selected in the menu tree. Status Bar (right side)Shows the last entry displayed by the discovery process and the possible error message. Fabric paneDisplays a map of the network fabric, including switches, hosts, and storage. It also provides tabs for displaying log and event data.
5-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
6 7 Status Bar (left side)Shows short-term transient messages, such as the number of rows displayed in a table. Physical Attributes paneDisplays a tree of available configuration tasks depending on the fabric, VSAN, or zone selected previously. Lists the switches and end devices in the logical selection. Logical Domains paneDisplays a tree of configured SAN, fabrics, VSANs, and zones, and provides access to user-defined groups. The label next to the segmented VSAN indicates the number of segments.
Note
You can resize each pane by dragging the boundaries between each region or by clicking the Minimize or Maximize controls.
Menu Bar
The menu bar at the top of the Cisco DCNM-SAN main window provides options for managing and troubleshooting the current fabric and for controlling the display of information on the Fabric pane. The menu bar provides the following menus:
FileOpens a new fabric, rediscovers the current fabric, locates switches, sets preferences, prints the map, and exports the Fabric pane log. ViewChanges the appearance of the map (these options are duplicated on the Fabric pane toolbar). ZoneManages zones, zone sets, and inter-VSAN routing (IVR). ToolsVerifies and troubleshoots connectivity and configuration, as described in the Cisco DCNM-SAN Troubleshooting Tools section on page 5-33. PerformanceRuns and configures Performance Manager and Cisco Traffic Analyzer, and generates reports. ServerRuns administrative tasks on clients and fabrics. Provides Cisco DCNM-SAN Server management and a purge command. Lists fabrics being managed. HelpDisplays online help topics for specific dialog boxes in the Information pane.
File
The file menu provides the following options:
Open FabricOpens a new switch fabric. Locate Switches and Devices Uses the SNMPv2 protocol to discover devices responding to SNMP requests with the read-only community string public. You may use this feature if you want to locate other Cisco MDS 9000 switches in the subnet, but are not physically connected to the fabric. RediscoverInitiates an on-demand discovery to learn recent changes from the switches and update the Cisco DCNM-SAN Client. You may use this option when Cisco DCNM-SAN Server is not in sync with switches in the fabric and you do not want to wait until the next polling cycle. The rediscover option does not delete the fabric and add it again. You may delete and add the fabric only if the rediscover option fails to update Cisco DCNM-SAN Server.
5-8
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Resync All Open Fabrics Cisco DCNM-SAN Server forces all the fabrics to close and re-open. You may use this option when Cisco DCNM-SAN Client is not in sync with Cisco DCNM-SAN Server. Rediscover SCSI Targets Initiates an on-demand discovery to learn recent changes from the SCSI target switches. You may use this option when Cisco DCNM-SAN Server is not in sync with SCSI target switches in the fabric and you do not want to wait until the next polling cycle. PreferencesSets your preferences to customize the behavior of the Cisco DCNM-SAN Client. Import EnclosuresImports saved enclosures. Export
Map ImageGenerates and export the map to a specified location. VisioExports the map to a Visio file. TableExports the table data to a text file. LogExports the log to a text file. EventsExports the events to a text file. EnclosuresExports the enclosure values to a text file.
View
View menu provides the following options:
Zoom
InZooms in the view. OutZooms out the view. FitFits the view in the fabric pane.
GridEnables the grid view. Overview WindowAllows you to center the Fabric pane on the area of the fabric that you want to see. This option is useful for large fabrics that cannot be displayed entirely within the Fabric pane. LegendShows all the legends used in the fabric map. Find in MapFinds a device in the fabric map.
Zone
The zone menu provides the following options:
5-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Edit Local Full Zone DatabaseAllows you to create zones across multiple switches. Zones provide a mechanism for specifying access control. Zone sets are a group of zones to enforce access control in the fabric. All zoning features are available through the Edit Local Full Zone Database dialog box. Deactivate ZonesetDeactivates an active zone set. Copy Full Zone DatabaseCreates a new zone set. On the Cisco MDS Family switches, you cannot edit an active zone set. However, you can copy an active zone set to create a new zone set that you can edit. Merge AnalysisEnables you to determine if zones will merge successfully when two Cisco MDS switches are interconnected. If the interconnected switch ports allow VSANs with identical names or contain zones with identical names, then Cisco DCNM-SAN verifies that the zones contain identical members. You can use merge analysis tool before attempting a merge, or after fabrics are interconnected to determine zone merge failure causes. Merge Fail RecoveryRecovers the port from its isolated state either by importing the neighboring switch's active zone set database and replacing the current active or by exporting the current database to the neighboring switch. Migrate Non-MDS DatabaseMigrate a non-MDS database using Cisco DCNM-SAN (you may need to use the Zone Migration Wizard to accomplish this task). IVR
Deactivate ZonesetDeactivates an active zone set. Copy Full Zone DatabaseRecovers an IVR zone database by copying the IVR full zone
zone database.
Tools
Tools menu provides the following options:
Health
Switch HealthDetermines the status of the components of a specific switch. Fabric ConfigurationAnalyzes the configuration of a switch by comparing the current
configuration to a specific switch or to a policy file. You can save a switch configuration to a file and then compare all switches against the configuration in the file.
Show Tech SupportCollects large amount of information about your switch for
troubleshooting purposes. When you issue a show tech support command from Cisco DCNM-SAN for one or more switches in a fabric, the results of each command are written to a text file, one file per switch, in a directory you specify. You can then view these files using Cisco DCNM-SAN.
Connectivity
End to End ConnectivityDetermines connectivity and routes among devices with the switch
fabric. This tool checks to see that every pair of end devices can talk to each other, using a Ping test and by determining if they are in the same VSAN or in the same active zone.
PingDetermines connectivity from another switch to a port on your switch. Trace RouteVerifies connectivity between two end devices that are currently selected on the
Fabric pane.
5-10
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Compact Flash ReportAutomatically scans the fabric and generate a report that shows the
status of CompactFlash.
NPV
CFS Static Peer SetupManage the peer list used during CFS on NPV-enabled switches. After
setting up the static peers list, the CFS discovery on the switches will be changed to static mode for all peers in the list. Cisco DCNM-SAN does not automatically update static peers list. You may need to update the list using the CFS Static Peer Setup Wizard when a new switch is added to the fabric.
Traffic Map SetupConfigures the list of external interfaces to the servers, and enabling or
disabling disruptive load balancing. Using Traffic Map Setup you can specify the external ports that a server should use for traffic management.
Flex Attach Pre-Configure ServerSets the port configurations for all the ports in a switch such
as enabling or disabling FlexAttach, setting the default VSAN ID, and setting the interface status.
Flex Attach Move ServerMoves a server to another port on the same NPV device or another
and automates the session creation by matching the LUNs in the existing and new storage.
FCoELaunches the FCoE Configuration Wizard to create virtual Fibre Channel interfaces. Port ChannelCreates PortChannels from selected ISL either manually or automatically. DPVM SetupEstablishes dynamic port VSAN membership, enables autolearning, and activates the DPVM database. IP SAN
FCIP TunnelCreates FCIP links between Gigabit Ethernet ports. Enables Fibre Channel write
list.
SAN Extension TunerOptimizes FCIP performance by generating either direct access
(magnetic disk) or sequential access (magnetic tape) SCSI I/O commands and directing such traffic to a specific virtual target. This option is used to generate SCSI I/O commands (read and write) to the virtual target based on your configured options.
Security
Port SecurityPrevents unauthorized access to a switch port in the Cisco MDS 9000 Family,
Install
LicenseFacilitate download and installation of licenses in selected switches in the fabric.
5-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
SoftwareVerifies image compatibility and installs software images on selected switches in the
fabric.
Flow Load Balance CalculatorAllows you to get the best load-balancing configuration for your FICON flows. The calculator does not rely on any switch or flow discovery in the fabric. Device ManagerInvokes Device Manager for a switch. Command Line Interface Enables command-line operations. Run CLI CommandsRuns command-line operations on more than one switch at a time.
Performance
The performance menu provides the following options:
Create FlowsCreates host-to-storage, storage-to-host, or bidirectional flows. You can add these flows to a collection configuration file to monitor the traffic between a host or storage element pair.
Server
The server menu provides the following options:
AdminOpens the control panel. Purge Down ElementsPurges all down elements in the fabric.
Help
The help menu provides the following options:
Contents Launches the online help contents. Config GuideLaunches the Cisco DCNM-SAN Configuration Guide. AboutDisplays information about Cisco DCNM-SAN.
Toolbar
The Cisco DCNM-SAN main toolbar provides icons for accessing the most commonly used menu bar options as shown in Table 5-3.
Table 5-3 Cisco DCNM-SAN Client Main Toolbar
Icon
5-12
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 5-3 Cisco DCNM-SAN Client Main Toolbar (continued)
Icon
5-13
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 5-3 Cisco DCNM-SAN Client Main Toolbar (continued)
Icon
Monitors ISL performance. Brings up real-time ISL performance information for all interfaces in the fabric, in the Information pane. Shows online help.
DETAILED STEPS
Step 1
Choose Server > Admin. You see the Control Panel dialog box.
5-14
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2 Step 3
Double-click the fabric name and enter the new name of the fabric. Click Apply to change the name.
Filtering
Cisco DCNM-SAN has a filtering mechanism that displays only the data that you are interested in. To filter, first select the fabric and VSAN from the Logical Domains pane. This action narrows the scope of what is displayed in the Fabric pane. Any information that does not belong to the selected items is dimmed. Also, any information that does not belong to the selected items is not displayed in the tables in the Information pane. The filter that you select is displayed at the top right of the Cisco DCNM-SAN window. To further narrow the scope, select attributes from the Physical Attributes pane. The Cisco DCNM-SAN table, display, and filter criteria change accordingly.
SwitchesViews and configures hardware, system, licensing, and configuration files. InterfacesViews and configures FC physical, FC logical, VFC (FCoE), Ethernet, SVC, and PortChannel interfaces. FC ServicesViews and configures Fibre Channel network configurations. IPViews and configures IP storage and IP services. EventsViews and configures events, alarms, thresholds, notifications, and informs. SecurityViews and configures MDS management and FC-SP security. FCoEViews and configures FCoE interfaces. ISLsViews and configures Inter-Switch Links. End DevicesViews and configures end devices.
Note
You cannot view the detailed physical attributes of the data center switches or monitor the connections. When you select either a data center node or a LAN node the physical attributes pane will be blank.
5-15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Viewing Switch Options
When you select the datacenter node, the switch table displays all the switches that are discovered. When you select the SAN node or the fabric node, the switch table displays all the Fibre Channel switches and when you select the LAN node, the switch table displays all the Ethernet switches.
DETAILED STEPS
Step 1 Step 2
Click Switches in the Physical Attributes pane. Right-click the device in the table. The pop-up menu provides the following options:
Apply ChangesApplies the changes to the switch. Refresh ValuesRefreshes the current values. Undo ChangesUndoes modifications to the switch. Export to FileExport the values to a file. Print TablePrints the table. Detach TableDetaches the table. Switch AttributesChanges the switch properties. Interface AttributesChanges the interface properties. Element ManagerManages this switch. Command Line InterfaceEnables to perform command line operations. CopyCopies the switch. PurgePurges the switch. Fix LocationFixes the switch in the current location. AlignAligns the switch. Show End DevicesShows the end devices. Expand Multiple LinksExpands the links to this switch. OtherOther options. GroupGroups switches.
DETAILED STEPS
Step 1 Step 2
In the Physical Attributes pane, click ISLs and then click Summary tab. Right-click the device in the table. The pop-up menu provides the following options:
5-16
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CopyCopies information from a specific field. FindConducts search based on the input string. Export to FileExports the values to a file. Print TablePrints the table. Detach TableDetaches the table. Interface AttributesChanges the interface properties. Element ManagerManages the device. FCIP Tunnel AttributesChanges FCIP tunneling properties. Create Port ChannelCreates port channel. Re-enableReenables a disabled device. Enable FC-SPEnables FC-SP. SAN Extention TunerOptimizes FCIP performance. PurgePurges the device.
Note
When you select a port channel from the table, the pop-up menu will have the following additional options:
Member AttributesChanges the member properties. Channel AttributesChanges the port channel properties. EditEdits the channel properties.
In the Physical Attributes pane, click End Devices and then click the Summary tab. Right-click the device in the table. The pop-up menu provides the following options:
Apply ChangesApplies the changes to the device. Refresh ValuesRefreshes the current values. CopyCopies the information specific to the field. PastePastes the copied text. Undo ChangesUndoes modifications to the device. FindSearches for information depending on the input string. Export to FileExports the values to a file. Print TablePrints the table. Detach TableDetaches the table. Device AttributesChanges the device properties. Interface AttributesChanges the interface properties.
5-17
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Element ManagerManages this device. Command Line InterfaceEnables you to perform command line operations. CopyCopies the switch. PurgePurges the switch. Fix LocationFixes the switch in the current location. AlignAligns the switch. PingPings another device. Trace RouteDetermines the route taken by packets across the network. Select Dependent PortsSelects dependent ports. GroupGroups devices.
Information Pane
Use the Information pane to display tables of information associated with the option selected from the menu tree in the Logical Domains or Physical Attributes panes. The Information pane toolbar provides buttons for performing one or more of the operations shown in Table 5-4.
Table 5-4 Information Pane Toolbar
Icon
Opens the appropriate dialog box to make a new row in the table. Deletes the currently highlighted rows from the table. Copies data from one row to another.
5-18
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 5-4 Information Pane Toolbar (continued)
Icon
Displays a non-editable copy of the table in the Information pane in its own window, which you can move around the screen.
Note
After making changes, you must save the configuration or the changes will be lost when the device is restarted.
Note
The buttons that appear on the toolbar vary according to the option that you select. They are activated or deactivated (dimmed) according to the field or other object that you select in the Information pane.
Detachable Tables
Detachable tables in Cisco DCNM-SAN allow you to detach tables and move them to different areas on your desktop so that you can compare similar tables from different VSANs. You can keep informational tables open from one view while you examine a different area in Cisco DCNM-SAN. To detach tables, click the Detach Table icon in the Information pane in Cisco DCNM-SAN.
Fabric Pane
Use the Fabric pane to display the graphical representation of your fabric. Table 5-5 explains the graphics you may see displayed, depending on which devices you have in your fabric.
Table 5-5 Cisco DCNM-SAN Graphics
Icon or Graphic
iSAN
5-19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 5-5 Cisco DCNM-SAN Graphics (continued)
Icon or Graphic
Cisco SN5428.
Dashed or dotted orange line through a device indicates that the device is manageable but there are operational problems. Dashed or dotted orange X through a device or link indicates that the device or ISL is not working properly. A red line through a device indicates that the device is not manageable. A red X through a device or link indicates that the device is down or that the ISL is down. Fibre Channel HBA (or enclosure).
iSCSI host.
Terminal blocks
1 2 3
99509
5-20
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 5-5 Cisco DCNM-SAN Graphics (continued)
Icon or Graphic
IP PortChannel.
DWDM connection.
NPV connection.
IP cloud (hosts). This icon is also used to represent a fabric when viewing a SAN (multiple fabrics) in the Cisco DCNM-SAN Fabric pane. Any device, cloud, or loop with a box around it means that there are hidden links attached.
If a switch or director is grayed out, Cisco DCNM-SAN can no longer communicate with it. The bottom of the Fabric pane has the following tabs:
FabricWhen displaying multiple fabrics, each fabric has its own tab. You can switch between fabrics by clicking on their respective tabs. LogDisplays messages that describe Cisco DCNM-SAN operations, such as fabric discovery. EventsDisplays information about the SNMP traps received by the management station. This includes combination events as detected by discovery and important traps such as license, SNMP, and FICON. Turn off end device labels. Collapse loops. Collapse expanded multiple links (collapsed multiple links are shown as very thick single lines). Dim or hide portions of your fabric by VSAN.
When viewing large fabrics in the Fabric pane, it is helpful to do the following tasks:
Note
When a VSAN, zone, or zone member is selected in the VSAN tree, the map highlighting changes to identify the selected objects. To remove this highlighting, click the Clear Highlight button on the Fabric pane toolbar or choose Clear Highlight from the pop-up menu.
5-21
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Context Menus
When you right-click an icon in the Fabric pane, you see a pop-up menu with options that vary depending on the type of icon selected. The various options available for different objects include the following:
Open an instance of Device Manager for the selected switch. Open a CLI session for the selected switch. Copy the display name of the selected object. Execute a ping or traceroute command for the device. Show or hide end devices. View attributes. Quiesce and disable members for PortChannels. Set the trunking mode for an ISL. Create or add to a PortChannel for selected ISLs.
The Fabric pane has its own toolbar with options for saving, printing, and changing the appearance of the map. When you right-click the map, a pop-up menu appears that provides options (duplicated on the toolbar) for changing the appearance of the map.
Note
You can launch web-based or non-web-based applications from the Fabric pane. To do this, you assign an IP address to the storage port or enclosure. Then right-click to bring up the pop-up menu, and select Device Manager.
The default layer includes all switches and links in the fabric. The end devices layer includes the end devices and can be turned off to remove end devices from the Visio diagram.
To save the map as a Visio diagram, choose Files > Export > Visio and choose Map or Map with link labels. The saved Visio diagram retains the viewing options that you selected from the Fabric pane. For example, if you collapse multiple links in the map and export the links as a Visio diagram, the Visio diagram shows those multiple links as one solid link. The Show Tech Support option from the Tools menu also supports saving the map as a Visio diagram.
Choose Server > Purge Down Elements. This purges all down elements in the fabric. Right-click the Fabric pane and choose Purge Down Elements. Right-click a down element and choose Purge. This action purges only this element from the fabric.
5-22
OL-25174-02
Chapter 5
Configuring Cisco DCNM-SAN Client Cisco DCNM-SAN Client Quick Tour: Admin Perspective
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
If you select an element that is not down and purge it, that element will reappear on the next fabric discovery cycle.
Note
Enclosure names should be unique. If the same enclosure name is used for each port, Cisco DCNM-SAN shows a host/target enclosure connected to both fabrics. To fix this problem, you can either disable auto-creation or create unique enclosure names.
Filtering by Groups
You can filter the Fabric pane display by creating groups of switches or end ports.
DETAILED STEPS
Step 1
Right-click a switch or end port in the Fabric pane map and select Group > Create. You see the Edit User Defined Group dialog box . Enter a group name in the Name field. Use the arrows to move additional switches or end ports from the Available column to the Selected column. Click OK to save the group.
DETAILED STEPS
Step 1
Right-click a switch or end device and select Group > Add To > YourGroupName. You see the Edit User Defined Group dialog box. Use the arrows to move additional switches or end ports from the Available column to the Selected column. Click OK to save the updated group.
Step 2 Step 3
5-23
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
Expand the Groups folder in the Logical Domains pane. You see the list of groups that you have created. Click the name of the group that you want to filter. In the Fabric pane, the switches or end devices in your group are shown normally; all other switches and end devices are shown in gray.
Step 2
Step 3
Click the Groups folder in the Logical Domains pane to return the display to normal.
Note
User-defined groups tables are filtered based on switches in the group except for switches where CFS-controlled features are enabled when all CFS member switches are displayed to avoid misconfigurations.
Status Bar
The status bar at the bottom of the Cisco DCNM-SAN window shows the last entry displayed by the discovery process, and the possible error message on the right side. The status bar displays a message stating that something has changed in the fabric and a new discovery is needed. The status bar shows both short-term, transient messages (such as the number of rows displayed in the table) and long-term discovery issues.
Launching Fabric Manager Client in Cisco SAN-OS Release 3.2(1) and Later
You can launch Fabric Manager Client.
Note
Network administrators must initially launch Cisco DCNM-SAN Client using Cisco DCNM-SAN Web Server, as described in the following procedure. Once an administrator has installed the Cisco DCNM-SAN Client icon on your desktop, you can double-click the icon to launch the Cisco DCNM-SAN Client.
5-24
OL-25174-02
Chapter 5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
Open your browser and enter the IP address where you installed Cisco DCNM-SAN Server, or enter localhost if you installed Cisco DCNM-SAN Server on your local workstation. You see the Cisco DCNM Web Client Login dialog box. Enter your user name and password and click Login. You see the Cisco DCNM Web Client Summary page. Click the Download link in the upper right corner of the page. You see the Download page for Cisco DCNM-SAN and Device Manager. Click the link for Cisco DCNM-SAN. If you are launching Cisco DCNM-SAN Client for the first time, you see a message asking whether you want to create shortcuts for Cisco DCNM-SAN.
Step 2
Step 3
Step 4
Step 5
Note
This message only appears the first time you launch Cisco DCNM-SAN Client. If you select No, your selection will be remembered and you will not be prompted to make a selection again. In this case, you will need to launch Cisco DCNM-SAN Client using the Cisco DCNM-SAN Web Client.
Step 6
When the software is installed and icons are created on your desktop, double-click the Cisco DCNM-SAN icon to launch Cisco DCNM-SAN. You see the Cisco DCNM-SAN Login dialog box. Enter the Cisco DCNM-SAN Server user name and password. Check the Use SNMP Proxy check box if you want Cisco DCNM-SAN Client to communicate with Cisco DCNM-SAN Server through a TCP-based proxy server. Click Login. Once you successfully log in to Cisco DCNM-SAN Server, you can set the seed switch and open the fabrics that you are entitled to access.
Note
When you launch Cisco DCNM-SAN Client for the first time or when there are no available fabrics, you see the Discover New Fabric dialog box.
Click the Ethernet (CDP) radio button to discover using Cisco Discovery Protocol (CDP). Starting from NX-OS Release 4.2(0), Fabric Manager uses Cisco Discovery Protocol to discover Ethernet switches such as Nexus 5000, Nexus 7000, Catalyst 4000, and Catalyst 6000 switches. You need to use a CDP seed switch for a CDP discovery. Set the fabric seed switch to the Cisco MDS 9000 Family switch or Cisco Nexus 5000 Series that you want Fabric Manager to use.
5-25
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 12
Choose the Auth-Privacy option according to the privacy protocol you have configured on your switch:
a. b.
If you have not configured the switch with a privacy protocol, then choose Auth-Privacy option MD5 (no privacy). If you have configured the switch with your privacy protocol, choose your Auth-Privacy choice.
Note
You may use SNMP v2 credentials for CDP discovery as the most of the Catalyst switches do not use MD5-DES for configuration.
Note
If you want a clean fabric discovery, remove the fabric and rediscover it. If you want a clean LAN discovery, unmanage LAN, remove the CDP seed switch and then rediscover it.
Step 13 Step 14
Enter the username and password for the switch. (Optionsl) To limit the discovery, specify the VSAN range. Scoping limits the resources discovered by Cisco DCNM-SAN client. You can either include a range of VSANs to be discovered or exclude a range of VSANs from being discovered.
a. b.
To limit the discovery to a range of VSANs, click Included VSAN List radio button. Specify the range of VSANs. To exclude a range of VSANs from being discovered, click Excluded VSAN List radio button. Specify the range of VSANs to be excluded.
Step 15
Click Discover. You see the Control Panel dialog box. You see the included and excluded VSANs list under the Fabric tab.
Note
You see a message in the dialog box when the server and client are running on the same workstation and there are unlicensed fabrics in the database. You also see a message when there are unmanaged fabrics (the state of the licenses is unknown).
Note
In the open tab, you see all the discovered fabrics displayed in the control panel. You need to click on the Open button to see all the discovered Ethernet switches.
Step 16
Check the check box(es) next to the fabric(s) you want to open in the Select column, or click Discover to add a new fabric.
Note
Only network administrators can continuously manage or unmanage fabrics. For more information, see the Selecting a Fabric to Manage Continuously section on page 3-6.
Step 17
5-26
OL-25174-02
Chapter 5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
If you have an incomplete view of your fabric, rediscover the fabric with a user that has no VSAN restriction. If the fabric includes a Cisco Nexus 5000 Series switch, then the Layer 2 node appears under the Switches > Interfaces > Ethernet tree, the VFC (FCoE) node appears under the Switches > Interfaces tree, and the FCoE node appears under the Switches tree in the Physical Attributes pane. For Cisco Nexus 5000 Series switches in the fabric, the tooltip for the switch shows the bind information of a virtual Fibre Channel interface to its corresponding Ethernet interface, such as vfc2(eth1/4).
You can launch Cisco DCNM-SAN Client from within a running instance of Cisco DCNM-SAN.
DETAILED STEPS
Step 1
Choose File > Open or click the Open Switch Fabric icon on the Cisco DCNM-SAN toolbar. You see the Control Panel dialog box. Check the check box(es) next to the fabric(s) you want to open in the Select column and click Open.
Step 2
Note
Changes made using Cisco DCNM-SAN are applied to the running configuration of the switches that you are managing. If you have made changes to the configuration or performed an operation (such as activating zones), Cisco DCNM-SAN prompts you to save your changes before you exit.
DETAILED STEPS
Step 1
Open your browser and enter the IP address where you installed Cisco DCNM-SAN Server, or enter localhost if you installed Cisco DCNM-SAN Server on your local workstation. You see the Cisco DCNM-SAN Web Server Login dialog box. Enter your user name and password and click Login. You see the Cisco DCNM-SAN Web Client Summary page. Click the Download link in the upper right corner of the page. You see the Download page for Cisco DCNM-SAN and Device Manager. Click the link for Cisco DCNM-SAN.
Step 2
Step 3
Step 4
5-27
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
You see the Cisco DCNM-SAN Server launch pad.
Step 5 Step 6
Enter the host name of the server or IP address in the Server URL drop-down list. Click Start.
Note
Launch pad retains the history of the server URLs used. You can choose one of the previously user Server URLs from the drop-down list.
General SNMP Map Show Device Name byDisplays the switches in the Fabric pane by IP address, DNS name, or logical name. The default setting for this value is Logical Name. Show WorldWideName (WWN) VendorDisplays the world wide name vendor name in any table or listing displayed by Cisco DCNM-SAN. Check the Prepend Name check box to display the name in front of the IP address of the switch. Check the Replacing Vendor Bytes check box to display the name instead of the IP address. The default is the Prepend Name option. Show End Device UsingDisplays end devices in the Fabric pane using alias or pWWN alias. The default setting for this value is Alias. Show Shortened iSCSI NamesDisplays the default setting for this value is OFF. Show Timestamps as Date/TimeDisplays timestamps in the date/time format. If this preference is not checked, timestamps are displayed as elapsed time. The default setting is enabled (checked). Telnet PathDisplays the path for the telnet.exe file on your system. The default is telnet.exe, but you need to browse for the correct location.
Note
If you browse for a path or enter a path and you have a space in the pathname (for example, c:\program files\telnet.exe), then the path will not work. To get the path to work, you must manually place quotes around it (for example, "c:\program files\telnet.exe").
Use Secure Shell instead of TelnetSpecifies whether to use SSH or Telnet when using the CLI to communicate with the switch. If enabled, you must specify the path to your SSH application. The default setting is disabled. Confirm DeletionDisplays a confirmation pop-up window when you delete part of your configuration using Cisco DCNM-SAN. The default setting is enabled (checked). Export Tables with FormatSpecifies the type of file that is created when you export a table using Device Manager. The options are tab-delimited or XML. The default setting is Tab-Delimited.
5-28
OL-25174-02
Chapter 5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Show CFS WarningsShows warning messages if CFS is not enabled on all switches for a selected feature. Retry request 1 time(s) after 5 sec timeoutYou can set the retry value to 0-5, and the timeout value to 3-30. Trace SNMP packets in LogThe default setting for this value is ON. Enable Audible Alert when Event ReceivedThe default setting for this value is OFF. Display Unselected VSAN MembersDisplays the unselected VSAN members in the Fabric pane. The default setting for this value is ON. Display End DevicesDisplays the fabrics end devices in the Fabric pane. The default setting for this value is ON. Display End Device LabelsDisplays the fabrics end device labels in the Fabric pane. The default setting for this value is OFF. Expand LoopsDisplays the loops in the fabric as individual connections in the Fabric pane. The default setting for this value is OFF. Expand Multiple LinksDisplays multiple links in the Fabric pane as separate lines instead of one thick line. The default setting for this value is OFF. Open New Device Manager Each TimeOpens a new instance of Device Manager each time that you invoke it from a switch in your fabric. The default value is OFF, which means that only one instance of Device Manager is open at a time. Select Switch or Link from TableAllows you to select a switch or link in the Fabric pane by clicking the switch or link in a table in the Information pane. The default setting for this value is disabled (unchecked), which means clicking a switch or link in the table does not change the switch or link selection in the Fabric pane. Layout New Devices AutomaticallyAutomatically places new devices in the Fabric pane in an optimal configuration. The default setting for this value is OFF. In this mode, when you add a new device, you must manually reposition it if the initial position does not suit your needs. Use Quick Layout when Switch has 30 or more End DevicesDisplays the default setting for this value (30). You can enter any number in this field. Enter 0 to disable Quick Layout. Override Preferences for Non-default LayoutDisplays the default setting for this value (ON). Automatically Save LayoutIf this option is enabled, any changes in the layout are automatically saved. The default setting for this value is ON. Detach Overview WindowAllows you to easily center the Fabric pane on the area of the fabric that you want to see. (This feature is useful for large fabrics that cannot be displayed entirely within the Fabric pane.) Bring up the overview window by clicking the Show/Hide Overview Window button. It overlays the fabric window and remains there until you click the Show/Hide Overview Window button again. If you enable this preference, you can detach the overview window and move it to one side while you access the Fabric pane. The default setting for this value is disabled (unchecked).
5-29
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Click the LAN node under Datacenter node. Click Switches tab in the Information pane. You can see the switch information.
Note
Datacenter is the parent node of SAN and LAN nodes. The SAN node remains in the tree as the parent for all the fabrics.
Removing a LAN
DETAILED STEPS
Step 1
Choose Server > Admin. You can see the switch information. Click to select the switch IP of the LAN you want to remove. Click Remove.
Step 2 Step 3
5-30
OL-25174-02
Chapter 5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
Expand End Devices and then choose Storage or Hosts in the Physical Attributes pane. You see the end devices displayed in the Information pane. Click one of the devices in the Fabric pane, or click the Enclosures tab of the Information pane, and then click the device name (in the Name field) that you want to include in the enclosure. Enter a name to identify the new enclosure in the Fabric pane map. Click once on the device name in the Name field. To select more than one name, press the Shift key and click each of the other names. Press Ctrl-C to copy the selected name(s). Press Ctrl-V to paste the device name into the Name field.
Note
To remove devices from an enclosure, triple click the device name and press Delete. To remove an enclosure, repeat this step for each device in the enclosure.
Expand End Devices and choose Hosts or Storage from the Physical Attributes pane. You see the list of devices in the Information pane. The NxPorts tab is the default. Right-click the enclosure names that you want to convert to alias names and choose Alias > Enclosure . The Ailas > Enclosures window appears . It contains a list of expressions. You can also add expressions to the list and modify expressions in the current list.
Step 2
Step 3
Click the Apply Changes icon to save the changes and then click Close.
Note
Cisco DCNM-SAN uses the regular expressions to convert multiple alias names into one enclosure. The alias names should be in the same expression pattern rule. You can create enclosure names from selected aliases using the regular expresssions list.
5-31
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Choose End Devices and from the Physical Attributes pane. Click the General tab. You see the list of devices in the Information pane. Select the device names that you want to populate the description with alias names and then click Alias > Enclosure button . You see the alias names are copied to corresponding rows in the description column.
Step 3
Note
Cisco DCNM-SAN does not parse or format the alias name while copying.
VSANCreates VSANs on multiple switches in the fabric and sets VSAN attributes including interop mode, load balancing, and FICON. Zone Edit ToolCreates zone sets, zones, and aliases. Adds members to zones and edits the zone database. IVR ZoneCreates IVR zone sets, zones, and aliases. Enables IVR NAT and auto-topology. Adds members to IVR zones, and edits the IVR zone database. FCoECreates virtual Fibre Channel (FC) interfaces and VLAN-VSAN mappings, and binds virtual FC interfaces to Ethernet interfaces or PortChannels.
5-32
OL-25174-02
Chapter 5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
PortChannelCreates PortChannels from selected ISLs either manually or automatically. Sets PortChannel attributes such as channel ID and trunking mode. FCIPCreates FCIP links between Gigabit Ethernet ports. Enables Fibre Channel write acceleration and IP compression. DPVMEstablishes dynamic port VSAN membership, enables autolearning, and activates the DPVM database. Port SecurityPrevents unauthorized access to Cisco MDS switches and reports these intrusions to the administrator. iSCSICreates zones for iSCSI initiators and adds a VSAN to a target-allowed VSAN list. NPVReduces the number of Fibre Channel domain IDs in SANs. QoSSets QoS attributes for zones in the selected VSAN. IP ACLCreates ordered IP access control lists and distributes to selected switches in the fabric. License InstallFacilitates download and installation of licenses in selected switches in the fabric. Software InstallVerifies image compatibility and installs software images on selected switches in the fabric.
Zone Merge AnalysisThe zone merge analysis tool (available from the Zone menu) enables you to determine if zones will merge successfully when two Cisco MDS switches are interconnected. If the interconnected switch ports allow VSANs with identical names or contain zones with identical names, then Cisco DCNM-SAN verifies that the zones contain identical members. The merge analysis tool can be run before attempting a merge or after fabrics are interconnected to determine zone merge failure causes. End-to-End ConnectivityCisco DCNM-SANs end-to-end connectivity analysis tool uses FC Ping to verify interconnections between Cisco MDS switches and end-device (HBAs and storage devices) in a particular VSAN. In addition to basic connectivity, Cisco DCNM-SAN can optionally verify the following:
Paths are redundant. Zones contain at least two members.
End devices are connected to a manageable switch (have a currently active in-band or out-of-band management path.)
Switch Health AnalysisYou can run an in-depth switch health analysis with Cisco DCNM-SAN. It verifies the status of all critical Cisco MDS switches, modules, ports, and Fibre Channel services. Over 40 conditions are checked. This tool provides a very fast, simple, and thorough way to assess Cisco MDS switch health. Fabric Configuration AnalysisCisco DCNM-SAN includes a fabric configuration analysis tool. It compares the configurations of all Cisco MDS switches in a fabric to a reference switch or a policy file. You can define what functions to check and what type of checks to perform. The analysis can look for mismatched values, and missing or extra values. If all configuration checking is performed for all functions, over 200 checks are performed for each Cisco MDS switch.
5-33
Chapter 5 Integrating Cisco DCNM-SAN and Data Center Network Management Software
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
After the analysis is run, the results are displayed with details about the issues that were discovered. You can automatically resolve configuration differences by selecting them and clicking the Resolve button. Cisco DCNM-SAN automatically changes the configuration to match the reference switch or policy file.
In the Cisco DCNM-SAN fabric pane, right-click the Nexus switch in the LAN map that you want to open with DCNM. You see the pop-up menu . In the pop up menu, click DCNM and select appropriate context.
Step 2
5-34
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
Device Manager
This chapter contains descriptions and instructions for using the Cisco MDS 9000 Device Manager. This chapter contains the following sections:
Information About Device Manager, page 6-1 Device Manager Features, page 6-2 Using Device Manager Interface, page 6-2 Setting Device Manager Preferences, page 6-10
Cisco Nexus 2148T Fabric ExtenderIt has four 10-Gigabit Ethernet fabric interfaces for its uplink connection to the parent Cisco Nexus 5000 Series switch and eight 1-Gigabit Ethernet or 10-Gigabit Ethernet host interfaces for its downlink connection to servers or hosts.
6-1
Device Manager
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Cisco Nexus 2232PP Fabric ExtenderIt has eight 10-Gigabit Ethernet fabric interfaces with SFP+ interface adapters for its uplink connection to the parent Cisco Nexus 5000 Series switch and 32 10-Gigabit Ethernet fabric interfaces with SFP+ interface adapters for its downlink connection to servers or hosts. Cisco Nexus 2248TP Fabric ExtenderIt has four 10-Gigabit Ethernet fabric interfaces with small form-factor pluggable (SFP+) interface adapters for its uplink connection to the parent Cisco Nexus 5000 Series switch and 48 1000BASE-T (1-Gigabit) Ethernet host interfaces for its downlink connection to servers or hosts.
Device Manager allows you to discover and display these Fabric Extenders. Cisco Device Manager and the Cisco DCNM-SAN client support provisioning and monitoring of the 48-port 8-Gbps Advanced Fibre Channel switching module (DS-X9248-256K9) and the 32-port 8-Gbps Advanced Fibre Channel switching module (DS-X9232-256K9).
Configure virtual Fibre Channel interfaces. Configure Fibre Channel over Ethernet (FCoE). Configure zones for multiple VSANs. Manage ports, PortChannels, and trunking. Manage SNMPv3 security access to switches. Manage CLI security access to the switch. Manage alarms, events, and notifications. Save and copy configuration files and software image. View hardware configuration. View chassis, module, port status, and statistics.
6-2
OL-25174-02
Chapter 6
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 6-1 Device Manager, Device Tab
1 2 3 4
5 6 7
Menu Bar
The menu bar at the top of the Device Manager main window provides options for managing and troubleshooting a single switch. The menu bar provides the following options:
6-3
Device Manager
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DeviceOpens an instance of Device Manager, sets management preferences, sets the page layout, opens a Telnet/SSH session with the current switch, exports a device image, and closes the Device Manager application. PhysicalAllows you to view and manage inventory, modules, temperature sensors, power supplies, fans, and the entire system. InterfaceAllows you to configure and manage PortChannels, as well as Fibre Channel, Ethernet, iSCSI, and FICON ports. Also provides diagnostic, management and monitoring capabilities, as well as SPAN and port tracking.
Note
The Interface > Port Channels menu option does not appear if the Cisco Nexus 5000 Series switch is in NPV mode and runs a Cisco NX-OS release prior to 4.2(1).
FCAllows you to configure and manage VSAN, domain, and name server characteristics. Also provides advanced configuration capabilities. FCoEAllows you to configure the FCoE parameters and map VSANs to VLANs on a Cisco Nexus 5000 Series switch.
Note
The FCoE menu option appears only if the Cisco Nexus 5000 Series switch runs Cisco NX-OS Release 4.0(1a) or later releases.
FICONAllows you to configure and manage FICON VSANs, configure RLIR ERL information, swap selected FICON ports, and view FICON port numbers. IPAllows you to configure and manage the following types of information: FCIP, iSCSI, iSNS, routes, VRRP, and CDP. SecurityAllows you to configure and manage FCSP, port security, iSCSI security, SNMP security, common roles, SSH, AAA, and IP ACLs. AdminAllows you to save, copy, edit, and erase the switch configuration, monitor events, manipulate Flash files, manage licenses, configure NTP, use CFS, and reset the switch. Also enables you to use the show tech support, show cores, and show image commands. LogsShows the various logs: message, hardware, events, and accounting. Also displays FICON link incidents, and allows you to configure the syslog setup. HelpDisplays online help topics for specific dialog boxes in the Information pane.
Toolbar Icons
The Device Manager toolbar provides quick access to many Device Manager features. Once the icon is selected, a dialog box may open that allows configuration of the feature. The toolbar provides the main Device and Summary View icons as shown in Table 6-1.
6-4
OL-25174-02
Chapter 6
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 6-1 Device Manager Main Toolbar
Description Opens the Device Manager view for another switch, with the option to open this view in a separate window. Communicates with the switch and displays the information in the Device Manager view. Opens a separate CLI command window to the switch. Opens a configuration dialog box for the selected component (line card or port). Opens a window that lists the latest system messages that occurred on the switch. Opens the VSAN dialog box that provides VSAN configuration for the switch. Saves the current running configuration to the startup configuration. Copies configuration file between server and switch. Toggles the FICON and interface port labels.
Refresh Display
SysLog
VSANs
Save Configuration
Copy
Filters the port display to show only those ports belonging to the selected VSAN. Accesses online help for Device Manager.
Help
Dialog Boxes
If a toolbar icon is selected, a dialog box may open that allows configuration of the selected feature. The dialog box may include table manipulation icons. See the Information Pane section on page 5-5 for descriptions of these icons.
6-5
Device Manager
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Tabs
Click the Device tab on the Device Manager main window to see a graphical representation of the switch chassis and components.
Note
The Device view also shows the switch chassis information of the Cisco Nexus 2000 Series Fabric Extenders (FEXs) that are connected to a Cisco Nexus 5000 Series switch that runs Cisco NX-OS Release 5.0(1). Click the Summary tab on the Device Manager main window to see a summary of active interfaces on a single switch, as well as Fibre Channel and IP neighbor devices. The Summary View also displays port speed, link utilization, and other traffic statistics. There are two buttons in the upper left corner of the Summary View tab used to monitor traffic. To monitor traffic for selected objects, click the Monitor Selected Interface Traffic Util% button. To display detailed statistics for selected objects, click the Monitor Selected Interface Traffic Details button. You can set the poll interval, the type or Rx/Tx display, and the thresholds.
Note
The Summary tab does not display the utilization statistics (Util%) of virtual Fibre Channel interfaces for Cisco Nexus 5000 Series switches that run Cisco NX-OS Release 4.2.
Legend
The legend at the bottom right of the Device Manager indicates port status, as follows: Colors
GreenThe port is up. BrownThe port is administratively down. RedThe port is down or has failed. AmberThe port has a minor fault condition. GrayThe port is unreachable. BlueThe port is out of service. XLink failure EISL TEMulti-VSAN ISL FHost/storage FLF loop I iSCSI SDSPAN destination CHChannel CUControl Unit NPProxy N-Port (NPV Mode)
Labels
6-6
OL-25174-02
Chapter 6
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
TNPTrunking NP_Port (NPV Mode) TFTrunking F_Port fvFC Present (Cisco Nexus 5000 Series switches only)
6-7
Device Manager
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Tip
You can select multiple ports in Device Manager and apply options to all the selected ports at one time. Either select the ports by clicking the mouse and dragging it around them, or hold down the Control key and click each port. To enable or disable a port, right-click the port and click Enable or Disable from the pop-up menu. To enable or disable multiple ports, drag the mouse to select the ports and then right-click the selected ports. Then click Enable or Disable from the pop-up menu. To manage trunking on one or more ports, right-click the ports and click Configure. In the dialog box that appears, right-click the current value in the Trunk column and click nonTrunk, trunk, or auto from the pull-down list. To create PortChannels using Device Manager, click PortChannels from the Interface menu.
Note
To create a PortChannel, all the ports on both ends of the link must have the same port speed, trunking type, and administrative state.
Context Menus
Context menus are available in both Device Manager views by right-clicking a device or table. From Device View:
DeviceRight-click a system, module, or power supply to bring up a menu that gives you the option to configure or reset the device. Port Right-click a port to bring up a menu that shows you the number of the port you have clicked, and to give you the option to configure, monitor, enable, disable, set beacon mode, or perform diagnostics on the port. Table Right-click the table header to show a list of which columns to display in that table: Interface, Description, VSANs, Mode, Connected To, Speed (Gb), Rx, Tx, Errors, Discards, and Log. Click the Description field to bring up the appropriate configuration dialog box for the port type.
6-8
OL-25174-02
Chapter 6
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
Right-click the switch you want to manage on the Fabric pane map and choose Device Manager from the menu that appears. Double-click a switch in the Fabric pane map. Select a switch in the Fabric pane map and choose Tools > Device Manager.
Enter the IP adress of the device. Enter the user name and password. Check the Proxy SNMP through FMS check box if you want Device Manager Client to use a TCP-based proxy server. Choose the Auth-Privacy option according to the privacy protocol you have configured on your switch:
a. b.
If you have not configured the switch with a privacy protocol, then choose Auth-Privacy option MD5 (no privacy). If you have configured the switch with your privacy protocol, choose your Auth-Privacy choice.
Step 6
6-9
Device Manager
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Retry Requests x Time(s) After x sec TimeoutAllows you to set the retry request values. The default settings are 1 time after a 5-second timeout. Enable Status Polling Every x secsAllows you to set the status polling value. The default setting is enabled (checked) with a time of 40 seconds. Trace SNMP Packets in Message LogAllows you to set whether Device Manager traces SNMP packets and logs the trace. The default setting is disabled (unchecked). Register for Events After Open, Listen on Port 1163Allows you to register this switch so that events are logged once you open Device Manager. The default setting is enabled (checked). Show WorldWideName (WWN) VendorDisplays the world wide name vendor name in any table or listing displayed by Device Manager. If Prepend is checked, the name is displayed in front of the IP address of the switch. If Replace is checked, the name is displayed instead of the IP address. The default setting is enabled (checked) with the Prepend option. Show Timestamps as Date/TimeDisplays timestamps in the date/time format. If this preference is not checked, timestamps are displayed as elapsed time. The default setting is enabled (checked). Telnet PathSets the path for the telnet.exe file on your system. The default is telnet.exe, but you need to browse for the correct location.
Note
If you browse for a path or enter a path and you have a space in the pathname (for example, c:\program files\telnet.exe, then the path will not work. To get the path to work, manually place quotes around it (for example, "c:\program files\telnet.exe").
CLI Session Timeout x secs (0= disable)Specifies the timeout interval for a CLI session. Enter 0 to disable (no timeout value). The default setting is 30 seconds. Show Tooltips in Physical ViewDetermines whether tooltips are displayed in Physical (Device) View. The default setting is enabled (checked). Label Physical View Ports With:Specifies the type of label to assign to the ports when you are in Physical (Device) View. The options are FICON and Interface. The default setting is Interface. Export TableSpecifies the type of file that is created when you export a table using Device Manager. The options are Tab-Delimited or XML. The default setting is Tab-Delimited.
6-10
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
Information About Performance Manager, page 7-1 Flow Statistics, page 7-3 Flow Setup Wizards, page 7-4
Data Interpolation, page 7-2 Data Collection, page 7-2 Using Performance Thresholds, page 7-2 Creating a Flow Using Performance Manager Flow Wizard, page 7-4
Performance Manager gathers network device statistics historically and provides this information graphically using a web browser. It presents recent statistics in detail and older statistics in summary. Performance Manager also integrates with external tools such as Cisco Traffic Analyzer. The Performance Manager has three operational stages:
DefinitionThe Flow Wizard sets up flows in the switches. CollectionThe Web Server Performance Collection screen collects information on desired fabrics. PresentationGenerates web pages to present the collected data through DCNM-SAN Web Server.
Performance Manager can collect statistics for ISLs, hosts, storage elements, and configured flows. Flows are defined based on a host-to-storage (or storage-to-host) link. Performance Manager gathers statistics from across the fabric based on collection configuration files. These files determine which SAN elements and SAN links Performance Manager gathers statistics for. Based on this configuration, Performance Manager communicates with the appropriate devices (switches, hosts, or storage elements) and collects the appropriate information at fixed five-minute intervals. Performance Manager uses a round-robin database to hold the statistical data collected from the fabric. This data is stored based on the configured parameters in the collection configuration file. At each polling interval, Performance Manager gathers the relevant statistics and stores them in the round-robin database. This database is a fixed size and will not grow beyond its preset limits.
7-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Performance Manager creates a series of archived data to hold summarized information present in the real-time round-robin database. This archived data is used to generate daily, weekly, monthly, and yearly consolidated reports. In this way, Performance Manager maintains significant historical data without the cost of an ever-increasing database size.
Note
You must restart Performance Manager if you change the user credentials on DCNM-SAN Server.
Data Interpolation
One of the unique features of Performance Manager is its ability to interpolate data when statistical polling results are missing or delayed. Other performance tools may store the missing data point as zero, but this can distort historical trending. Performance Manager interpolates the missing data point by comparing the data point that preceded the missing data and the data point stored in the polling interval after the missing data. This maintains the continuity of the performance information.
Data Collection
One years worth of data for two variables (Rx and Tx bytes) requires a round-robin database (rrd) file size of 76 K. If errors and discards are also collected, the rrd file size becomes 110 K. The default internal values are as follows:
600 samples of 5 minutes (2 days and 2 hours) 700 samples of 30 minutes (12.5 days) 775 samples of 2 hours (50 days) 300 samples of 1 day
A 1000-port SAN requires 110 MB for a years worth of historical data that includes errors and discards. If there were 20 switches in this SAN with equal distribution of fabric ports, about two to three SNMP packets per switch would be sent every 5 minutes for a total of about 100 request or response SNMP packets required to monitor the data. Because of their variable counter requests, flows are more difficult to predict storage space requirements for. But in general you can expect that, each extra flow adds another 76 KB.
Note
Performance Manager does not collect statistics on nonmanageable and non-MDS switches. Loop devices (FL/NL) are not collected.
7-2
OL-25174-02
Chapter 7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Baseline thresholds create a threshold that adapts to the typical traffic pattern for each link for the same time window each day, week, or every two weeks. Baseline thresholds are set as a percent of the average (110% to 500%), where 100% equals the calculated weighted average. Figure 7-1 shows an example of setting a baseline threshold for a weekly or daily option.
Figure 7-1 Baseline Threshold Example
Mon 2/21
Average
Daily (option) 14 days Mon 2/14 Tues 2/15 Wed 2/16 Sun 2/27 @2 PM Threshold setting Mon 2/28 @2 PM
130886
Average
The threshold is set for Monday at 2 p.m. The baseline threshold is set at 130% of the average for that statistic. The average is calculated from the statistics value that occurred at 2 p.m. on Monday, for every prior Monday (for the weekly option) or the statistics value that occurred at 2 p.m. on each day, for every prior day (for the daily option).
Flow Statistics
Flow statistics count the ingress traffic in the aggregated statistics table. You can collect two kinds of statistics:
Aggregated flow statistics to count the traffic for a VSAN. Flow statistics to count the traffic for a source and destination ID pair in a VSAN.
If you enable flow counters, you can enable a maximum of 1 K entries for aggregate flow and flow statistics. Be sure to assign an unused flow index to a module for each new flow. Flow indexes can be repeated across modules. The number space for flow index is shared between the aggregate flow statistics and the flow statistics.
7-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Generation 1 modules allow a maximum of 1024 flow statements per module. Generation 2 modules allow a maximum of 2048-128 flow statements per module. Table 7-1 explains the Flow Type radio button that defines the type of traffic monitored.
Table 7-1 Performance Manager Flow Types
Description Unidirectional flow, monitoring data from the host to the storage element Unidirectional flow, monitoring data from the storage element to the host Bidirectional flow, monitoring data to and from the host and storage elements
Choose Performance > Create Flows. You see the Define Traffic Flows dialog box. Click the drop-down menu in the VSAN field. Choose the list of VSANs provided by the flow configuration wizard. Click the drop-down menu in the Zone field. Choose the list of zones provided by the flow configuration wizard. Click Next to continue to the next window . Choose items in the Possible Flow Pairs area. The Review Traffic Flows window displays all VSAN flow pairs in the Exisitng Flows for Vsan area. Click Add to create the selected flow. Choose items in the Existing Flows for Vsan area. Click Remove to remove the selected flow. Click Finish to restart the Performance Manager collection. You see the Confirmation dialog box. To verify the newly created flow, choose Physical Attributes > End Devices > Flow Statistics. The newly created flows are displayed.
7-4
OL-25174-02
Chapter 7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
Performance Manager Collection can be enabled for LAN devices and traffice counters are collected periodically.
7-5
Chapter 7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
7-6
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
Information About Network Monitoring, page 8-1 Device Discovery, page 8-2 Topology Mapping, page 8-3
8-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Device Discovery
Once DCNM-SAN is invoked, a SAN discovery process begins. Using information polled from a seed Cisco MDS 9000 Family switch, including Name Server registrations, Fibre Channel Generic Services (FC-GS), Fabric Shortest Path First (FSPF), and SCSI-3, DCNM-SAN automatically discovers all devices and interconnects on one or more fabrics. All available switches, host bus adapters (HBAs), and storage devices are discovered. The Cisco MDS 9000 Family switches use Fabric-Device Management Interface (FMDI) to retrieve HBA model, serial number and firmware version, and host operating-system type and version discovery without host agents. DCNM-SAN gathers this information through SNMP queries to each switch. The device information discovered includes device names, software revision levels, vendor, ISLs, PortChannels, and VSANs. For a VSAN change involving a third-party switch, DCNM-SAN will need a second discovery to show the correct topology due to the discovery dependency when there is any change in a mixed VSAN. The first discovery finds the third-party switch and the subsequent discovery will show the information on which VSAN it is going to join and can discover the end devices connected to it. You can wait for the subsequent discovery or trigger a manual discovery.
8-2
OL-25174-02
Chapter 8
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Topology Mapping
DCNM-SAN is built upon a topology representation of the fabric. DCNM-SAN provides an accurate view of multiple fabrics in a single window by displaying topology maps based on device discovery information. You can modify the topology map icon layout with an easy-to-use, drag-and-drop interface. The topology map visualizes device interconnections, highlights configuration information such as zones, VSANs, and ISLs exceeding utilization thresholds. The topology map also provides a visual context for launching command-line interface (CLI) sessions, configuring PortChannels, and opening device managers.
DETAILED STEPS
Step 1 Step 2 Step 3
Click File > Preferences to open the DCNM-SAN preferences dialog box. Click the Map tab and check the Automatically Save Layout check box to save any changes to the topology map . Click Apply, and then click OK to save this change.
8-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Clicking Alias->Enclosure displays hosts and storage elements in the Information pane. This is a shortcut to naming enclosures. To use this shortcut, highlight each row in the host or storage table that you want grouped in an enclosure then click Alias -> Enclosure. This automatically sets the enclosure names of each selected row with the first token of the alias.
Inventory Management
The Information pane in DCNM-SAN shows inventory, configuration, and status information for all switches, links, and hosts in the fabric. Inventory management includes vendor name and model, and software or firmware versions. Select a fabric or VSAN from the Logical Domains pane, and then select the Summary tab in the Information pane to get a count of the number of VSANS, switches, hosts, and storage elements in the fabric. See the Cisco DCNM-SAN Client Quick Tour: Admin Perspective section on page 5-7 for more information on the DCNM-SANDCNM-SAN user interface.
DETAILED STEPS
Step 1 Step 2
Point your browser at the DCNM-SAN Web Server. See the Adding a Security Exception section on page 2-5. Click the Events tab and then the Details tab to view the system messages. The columns in the events table are sortable. In addition, you can use the Filter button to limit the scope of messages within the table.
8-4
OL-25174-02
Chapter 8
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
You can view switch-resident logs even if you have not set up your local syslog server or your local PC is not in the switch's syslog server list. Due to memory constraints, these logs will wrap when they reach a certain size. The switch syslog has two logs: an NVRAM log that holds a limited number of critical and greater messages and a nonpersistent log that contains notice or greater severity messages. Hardware messages are part of these logs.
Note
To view syslog local logs, you need to configure the IP address of the DCNM-SAN Server in the syslog host.
8-5
Chapter 8
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
8-6
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
Monitoring Performance
This chapter describes how to configure Performance Monitoring tools for Cisco DCNM-SAN and Device Manager. These tools provide real-time statistics as well as historical performance monitoring. This chapter contains the following sections:
Information About Performance Monitoring, page 9-1 Configuring Performance Manager, page 9-2 Configuring the Summary View in Device Manager, page 9-4 Configuring Per Port Monitoring using Device Manager, page 9-4 Displaying DCNM-SAN Real-Time ISL Statistics, page 9-5 Displaying Performance Manager Reports, page 9-6 Generating Performance Manager Reports, page 9-8 Exporting Data Collections, page 9-11 Analyzing SAN Health, page 9-12
9-1
Monitoring Performance
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Device Manager checking for oversubscription on the host-optimized four-port groups on relevant modules. Right-click the port group on a module and choose Check Oversubscription from the pop-up menu. Device manager provides two performance views: the Summary View tab and the configurable monitor option per port.
Creating a Flow with Performance Manager, page 9-2 Creating a Collection with Performance Manager, page 9-2 Using Performance Thresholds, page 9-3
Collection Type Description ISLs Host Storage Flows Collects link statistics for ISLs. Collects link statistics for SAN hosts. Collects link statistics for a storage elements. Collects flow statistics defined by the Flow Configuration Wizard.
9-2
OL-25174-02
Chapter 9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Statistics Used in Average Calculation Every prior day at 4 pm Every prior Wednesday at 4 pm Every other prior Wednesday at 4 pm
Baseline thresholds create a threshold that adapts to the typical traffic pattern for each link for the same time window each day, week, or every 2 weeks. Baseline thresholds are set as a percent of the average (110% to 500%), where 100% equals the calculated average. As an example, a collection is created at 4 pm on Wednesday, with baseline thresholds set for 1 week, at 150% of the average (warning) and 200% of the average (critical). Performance Manager recalculates the average for each link at 4 pm every Wednesday by taking the statistics gathered at that time each Wednesday since the collection started. Using this as the new average, Performance Manager compares each received traffic statistic against this value and sends a warning or critical event if the traffic on a link exceeds this average by 150% or 200% respectively. Table 9-3 shows two examples of 1-Gigabit links with different averages in our example collection and at what traffic measurements the Warning and Critical events are sent.
Table 9-3 Example of Events Generated for 1-Gigabit Links
Set these thresholds on the last screen of the Collections Configuration Wizard by checking the Send events if traffic exceeds threshold check box.
9-3
Monitoring Performance
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Click the Summary tab on the main display. You see all of the active ports on the switch, as well as the configuration options available from the Summary view .
Figure 9-1 Device Manager Summary Tab
Step 2 Step 3
Choose a value from the Poll Interval drop-down list. Decide how you want your data to be interpreted by looking at the Show Rx/Tx drop-down menu. The table updates each polling interval to show an overview of the receive and transmit data for each active port on the switch. Select a value from the Show Rx/Tx drop-down list. If you select Util%, you need to also select values from the two Show Rx/Tx > %Util/sec drop-down lists. The first value is the warning level and the second value is the critical threshold level for event reporting. Note that you can also display percent utilization for a single port by selecting the port and clicking the Monitor Selected Interface Traffic Util % icon.
Step 4
9-4
OL-25174-02
Chapter 9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1 Step 2
Click the Device tab. Right-click the port you are interested in and choose Monitor from the drop-down menu. You see the port real-time monitor dialog box. Select a value from the Interval drop-down list to determine how often data is updated in the table shown here. Click a statistical value in the table then click one of the graphing icons to display a running graph of that statistic over time. You see a graph window that contains options to change the graph type.
Step 3 Step 4
Tip
You can open multiple graphs for statistics on any of the active ports on the switch.
Using the Performance Manager Configuration Wizard section on page 9-6 Viewing Performance Statics Using DCNM-SAN section on page 9-6
You can configure DCNM-SAN to gather ISL statistics in real time. These ISL statistics include receive and transmit utilization, bytes per second, as well as errors and discards per ISL.
DETAILED STEPS
Step 1
Choose Performance > ISLs in Real-Time. You see any ISL statistics in the Information pane .
Figure 9-2 ISL Performance in Real Time
Step 2 Step 3
Select a value from the Poll Interval drop-down list. Select two values from the Bandwidth utilization thresholds drop-down lists, one value for the minor threshold and one value for the major threshold. The table shown updates each polling interval to show the statistics for all configured ISLs in the fabric.
9-5
Monitoring Performance
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 4
Select a row in the table to highlight that ISL in blue in the Topology map.
DETAILED STEPS
Step 1
Right-click the ISL or end device in the Fabric pane. You see a context menu . Select Show Statics.
Step 2
Note
Show Statics menu will be enabled only if you add the fabric to the Performance Manager collection.
Displaying Performance Summary section on page 9-7 Displaying Performance Tables and Details Graphs section on page 9-7 Displaying Performance of Host-Optimized Port Groups section on page 9-7 Displaying Performance Manager Events section on page 9-7
You can view Performance Manager statistical data using preconfigured reports that are built on demand and displayed in a web browser. These reports provide summary information as well as detailed statistics that can be viewed for daily, weekly, monthly, or yearly results.
DETAILED STEPS
Step 1
Choose Performance > Reports to access Performance Manager reports from DCNM-SAN. This opens a web browser window showing the default DCNM-SAN web client event summary report. Click the Performance tab to view the Performance Manager reports.
Step 2
9-6
OL-25174-02
Chapter 9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Performance Manager begins reporting data ten minutes after the collection is started.
Note
9-7
Monitoring Performance
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Generating Top10 Reports in Performance Manager section on page 9-8 Generating Top10 Reports Using Scripts section on page 9-8
Tip
Name the reports with a timestamp so that you can easily find the report for a given day or week. These Top10 reports differ from the other monitoring tables and graphs in Performance Manager in that the other data is continuously monitored and is sortable on any table column. The Top10 reports are a snapshot view at the time the report was generated.
Note
Top10 reports require analyzing the existing data over an extended period of time and can take hours or more to generate on large fabrics. See the Creating a Custom Report Template section on page 2-40 for information on creating a Top10 report.
On UNIX, you can automate the generation of the Top10 reports on your DCNM-SANDCNM-SAN Server host by adding the following cron entry to generate the reports once an hour:
0 * * * * /<user_directory>/.cisco_mds9000/bin/pm.sh display pm/pm.xml <output_directory>
If your crontab does not run automatically or Java complains about an exception similar to Example 9-1, you need to add -Djava.awt.headless=true to the JVMARGS command in /<user_directory>/.cisco_mds9000/bin/pm.sh.
9-8
OL-25174-02
Chapter 9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Example 9-1 Example Java Exception
in thread main java.lang.InternalError Can't connect to X11 window server using '0.0' as the value of the DISPLAY variable.
A configured Fibre Channel Switched Port Analyzer (SPAN) destination (SD) port to forward Fibre Channel traffic. A Port Analyzer Adapter 2 (PAA-2) to convert the Fibre Channel traffic to Ethernet traffic. Cisco Traffic Analyzer software to analyze the traffic from the PAA-2.
DETAILED STEPS
Step 1 Step 2
Set up the Cisco Traffic Analyzer according to the instructions in the Cisco MDS 9000 Family Port Analyzer Adapter 2 Installation and Configuration Note. Get the following three items of information:
The IP address of the management workstation on which you are running Performance Manager and Cisco Traffic Analyzer. The path to the directory where Cisco Traffic Analyzer is installed. The port that is used by Cisco Traffic Analyzer (the default is 3000). Choose Performance > Traffic Analyzer > Open. Enter the URL for the Cisco Traffic Analyzer, in the format:
http://<ip address>:<port number>
Step 3
ip address is the address of the management workstation on which you have installed the Cisco Traffic Analyzer :port number is the port that is used by Cisco Traffic Analyzer (the default is :3000).
c. d. e.
Click OK. Choose Performance > Traffic Analyzer > Start. Enter the location of the Cisco Traffic Analyzer, in the format:
D:\<directory>\ntop.bat
D: is the drive letter for the disk drive where the Cisco Traffic Analyzer is installed. directory is the directory containing the ntop.bat file.
f. Step 4
Click OK.
Create the flows you want Performance Manager to monitor, using the Flow Configuration Wizard. See the Creating a Flow with Performance Manager section on page 9-2
9-9
Monitoring Performance
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 5
Define the data collection you want Performance Manager to gather, using the Performance Manager Configuration Wizard. See the Creating a Collection with Performance Manager section on page 9-2.
a. b. c.
Choose the VSAN you want to collect information for or choose All VSANs. Check the types of items you want to collect information for (Hosts, ISLs, Storage Devices, and Flows). Enter the URL for the Cisco Traffic Analyzer in the format:
http://<ip address>/<directory>
where: ip address is the address of the management workstation on which you have installed the Cisco Traffic Analyzer, and directory is the path to the directory where the Cisco Traffic Analyzer is installed.
d. e. f.
Click Next. Review the data collection on this and the next section to make sure this is the data you want to collect. Click Finish to begin collecting data.
Note
Data is not collected for JBOD or for virtual ports. If you change the data collection configuration parameters during a data collection, you must stop and restart the collection process for your changes to take effect.
Step 6
Choose Performance > Reports to generate a report. Performance Manager Web Server must be running. You see Web Services; click Custom then select a report template.
Note
It takes at least five minutes to start collecting data for a report. Do not attempt to generate a report in Performance Manager during the first five minutes of collection.
Step 7
Click Cisco Traffic Analyzer at the top of the Host or Storage detail pages to view the Cisco Traffic Analyzer information, or choose Performance > Traffic Analyzer > Open . The Cisco Traffic Analyzer page will not open unless ntop has been started already.
Note
For information on capturing a SPAN session and starting a Cisco Traffic Analyzer session to view it, refer to the Cisco MDS 9000 Family Port Analyzer Adapter 2 Installation and Configuration Note.
Note
For information on viewing and interpreting your Performance Manager data, see the Creating a Flow with Performance Manager section on page 9-2. For information on viewing and interpreting your Cisco Traffic Analyzer data, refer to the Cisco MDS 9000 Family Port Analyzer Adapter 2 Installation and Configuration Note.
9-10
OL-25174-02
Chapter 9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
For performance drill-down, DCNM-SAN Server can launch the Cisco Traffic Analyzer in-context from the Performance Manager graphs. The aliases associated with hosts, storage devices, and VSANs are passed to the Cisco Traffic Analyzer to provide consistent, easy identification.
Exporting Data Collections to XML Files section on page 9-11 Exporting Data Collections in Readable Format section on page 9-11
In this command, xxx is the RRD file and yyy is the XML file that is generated. This XML file is in a format that rrdtool is capable of reading with the command:
rrdtool restore filename.xml filename.rrd
This reads the XML export format that rrdtool is capable of writing with the command:
rrdtool xport filename.xml filename.rrd.
The pm xport and pm restore commands can be found on your DCNM-SAN Server at bin\PM.bat for Windows platforms or bin/PM.sh on UNIX platforms. For more information on the rrdtool, refer to the following website: http://www.rrdtool.org.
Note
DCNM-SAN Web Server must be running for this to work. You can export data collections to Microsoft Excel using DCNM-SAN Web Server.
9-11
Monitoring Performance
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
Click the Performance tab on the main page. You see the overview table. Click the Flows sub-tab. Right-click the name of the entity you want to export and select Export to Microsoft Excel . You see the Excel chart for that entity in a pop-up window.
Step 2 Step 3
DETAILED STEPS
Step 1 Step 2 Step 3
Go to the installation directory on your workstation and then go to the bin directory. On Windows, enter .\pm.bat export C:\Program Files\Cisco Systems\MDS 9000\pm\pm.xml <export directory>. This creates the csv file (export.csv) in the export directory on your workstation. On UNIX, enter ./pm.sh export /usr/local/cisco_mds9000/pm/pm.xml <export directory>. This creates the csv file (export.csv) in the export directory on your workstation.
When you open this exported file in Microsoft Excel, the following information displays:
Title of the entity you exported and the address of the switch the information came from. The maximum speed seen on the link to or from this entity. The VSAN ID and maximum speed. The timestamp, followed by the receive and transmit data rates in bytes per second.
Run Performance Monitor to collect I/O statistics Collect fabric inventory (switches and other devices) Create a graphical layout of fabric topology Create reports of error conditions and statistical data
You can install this tool at any SAN environment to collect I/O statistics for the specified time (usually 24 hours), generate health reports and automatically send reports to the designated system administrator for review at regular intervals. When you start SAN Health Advisor tool, it runs in wizard mode, and prompts for inputs such as seed switch credentials, IP address of the server to which the data to be sent and all the necessary information for the software setup. As soon as the fabric is discovered, the tool starts capturing performance data, I/O statistics and error conditions.
9-12
OL-25174-02
Chapter 9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The reports generated from the collection is stored in the $INSTALLDIR/dcm/fm/reports directory. These reports are automatically sent to the designated SAN administrator for review. In a situation where the tool fails to collect the data, it generates a report with an error message or exception. After sending the reports the tool automatically uninstalls itself and terminates all the processes that it established on the host machine. The report that SAN Health Advisor tool generates will have the following details:
Events System messages Analysis of connectivity Zone discrepancy System configuration Interface status Domain information Security settings
Note
The SAN Health tool is not installed by default when you install DCNM-SAN software.
DETAILED STEPS
Step 1
Double-click the San Health Advisor tool installer. You see the San Health Advisor tool Installer window. Select an installation folder on your workstation for SAN Health Advisor. On Windows, the default location is C:\Program Files\Cisco Systems\. Click Install to start the installation. You see the installation progressing. You see the Fabric Options dialog box In the Seed Switch text box, enter the IP address of the seed switch. Enter the user name and password for the switch. Select the authentication privacy option from the Auth-Privacy drop-down list box. Click the Performance Collection check box to enable the process to run for 24 hours. Click Collect to start gathering performance information. You see the collecting dialog box. If you want to stop gathering information in the middle of the process, click Cancel. You see the message indicating performance collection is complete.
Step 2
Step 3
9-13
Monitoring Performance
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 9
9-14
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
10
Software Images
This chapter describes how to install and upgrade Cisco MDS software images. It includes the following sections:
Information About Software Images, page 10-1 Prerequisites for Installing Software Images, page 10-4 Using the Software Install Wizard, page 10-8 Performing Nondisruptive Upgrades on Fabric and Modular Switches, page 10-11 Maintaining Supervisor Modules, page 10-12 Installing Generation 2 Modules in Generation 1 Chassis, page 10-14 Replacing Modules, page 10-14
Software Upgrade Methods, page 10-2 Determining Software Compatibility, page 10-2 Automated Upgrades, page 10-3 Benefits of Using the Software Install Wizard, page 10-3 Recognizing Failure Cases, page 10-4
Each switch is shipped with a Cisco MDS NX-OS or SAN-OS operating system for Cisco MDS 9000 Family switches. The Cisco MDS NX-OS consists of two imagesthe kickstart image and the system image. To upgrade the switch to a new image, you must specify the variables that direct the switch to the images.
To select the kickstart image, use the KICKSTART variable. To select the system image, use the SYSTEM variable.
The images and variables are important factors in any install procedure. You must specify the variable and the image to upgrade your switch. Both images are not always required for each install.
10-1
Software Images
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
Unless explicitly stated, the software install procedures in this chapter apply to any switch in the Cisco MDS 9000 Family.
AutomaticYou can use the DCNM-SAN Software Install Wizard for Cisco MDS NX-OS switches as described in the Using the Software Install Wizard section on page 10-8. ManualFor information on manual upgrades, see the Cisco MDS 9020 Switch Configuration Guide and Command Reference.
In some cases, regardless of which process you use, the software upgrades may be disruptive. These exception scenarios can occur under the following conditions:
A single supervisor module system with kickstart or system image changes. A dual supervisor module system with incompatible system software images.
Note
For high availability, you need to connect the ethernet port for both active and standby supervisors to the same network or virtual LAN. The active supervisor owns the one IP address used by these Ethernet connections. On a switchover, the newly activated supervisor takes over this IP address.
Image incompatibilityThe running image and the image to be installed are not compatible. Configuration incompatibilityThere is a possible incompatibility if certain features in the running image are turned off as they are not supported in the image to be installed. The image to be installed is considered incompatible with the running image if one of the following statements is true:
An incompatible feature is enabled in the image to be installed and it is not available in the
running image and may cause the switch to move into an inconsistent state. In this case, the incompatibility is strict.
An incompatible feature is enabled in the image to be installed and it is not available in the
running image and does not cause the switch to move into an inconsistent state. In this case, the incompatibility is loose.
10-2
OL-25174-02
Chapter 10
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Tip
The Software Install Wizard compares and presents the results of the compatibility before proceeding with the installation. You can exit if you do not want to proceed with these changes.
Automated Upgrades
The Software Install Wizard upgrades all modules in any Cisco MDS 9000 Family switch. Figure 10-1 provides an overview of the switch status before and after using Software Install Wizard.
Figure 10-1 The Effect of the Software Install Wizard
Cisco MDS 9500 Series switch Switch before issuing the install all comand Slot 5 install all 2.1(2b) to 3.0(1) Active supervisor module 2.1(2b) Slot 6 Standby supervisor module 2.1(2b) Switch after the install all comand completes Slot 5 Standby supervisor module 3.0(1) Slot 6 Active supervisor module 3.0(1)
154732
The Software Install Wizard automatically verifies if the standby supervisor module is functioning (if present). If it is not functioning, it reloads that module and uses the force download option to force it to function.
You can upgrade the entire switch using just one procedure command. You can receive descriptive information on the intended changes to your system before you continue with the installation. You can upgrade the entire switch using the least disruptive procedure. You can see the progress of this command on the console, Telnet, and SSH screens:
After a switchover process, you can see the progress from both the supervisor modules. Before a switchover process, you can only see the progress from the active supervisor module.
The Software Install Wizard automatically checks the image integrity. This includes the running kickstart and system images. The Software Install Wizard performs a platform validity check to verify that a wrong image is not used. For example, to check if an MDS 9500 Series image is used inadvertently to upgrade an MDS 9200 Series switch. After issuing the installation, if any step in the sequence fails, the wizard completes the step in progress and ends.
10-3
Software Images
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
For example, if a switching module fails to be updated for any reason (for example, due to an unstable fabric state), then the command sequence disruptively updates that module and ends. In such cases, you can verify the problem on the affected switching module and upgrade the other switching modules.
If the standby supervisor module bootflash: file system does not have sufficient space to accept the updated image. If the specified system and kickstart images are not compatible. If the fabric or switch is configured while the upgrade is in progress. If a module is removed while the upgrade is in progress. If the switch has any power disruption while the upgrade is in progress. If the entire path for the remote location is not specified accurately. If images are incompatible after an upgrade. For example, a switching module image may be incompatible with the system image, or a kickstart image may be incompatible with a system image. This is also identified by the Software Install Wizard compatibility check.
Caution
If the installation is ended, be sure to verify the state of the switch at every stage and reissue the command after 10 seconds. If you reissue the installation within the 10-second span, it is rejected with an error message indicating that an installation is currently in progress.
Tip
All configurations are disallowed while the installation is in progress. However, configurations coming through the CFS applications are allowed and may affect the upgrade procedure.
Software imagesThe kickstart and system image files reside in directories or folders that can be accessed from the Cisco MDS 9000 Family switch prompt. Image versionEach image file has a version. Flash disks on the switchThe bootflash: resides on the supervisor module and the CompactFlash disk is inserted into the slot0: device. Supervisor modulesThere are single or dual supervisor modules.
10-4
OL-25174-02
Chapter 10
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Selecting the Correct Software Images for Cisco MDS 9100 Series Switches
The Supervisor-1 and Supervisor-2 modules supported by Cisco MDS 9100 Series switches require different system and kickstart images. You can determine which images to use on your switch by the naming conventions shown in Table 10-1 and Table 10-2.
Table 10-1 Supervisor Module Software Image Naming Conventions for MDS 9100 Series
Cisco MDS 9100 Series Switch Type 9124, 9124e, 9134, Cisco Fabric Switch for HP c-Class BladeSystem, Cisco Fabric Switch for IBM BladeCenter
Table 10-2
Cisco MDS 9100 Series Switch Type Cisco MDS 9148 Multilayer Fabric Switch Cisco MDS 9124 Multilayer Fabric Switch
Naming Convention Filename begins with m9100-s3ek9. Filename begins with m9100-s3ek9.
Selecting the Correct Software Images for Cisco MDS 9200 Series Switches
The Supervisor-1 and Supervisor-2 modules supported by Cisco MDS 9200 Series switches require different system and kickstart images. You can determine which images to use on your switch by the naming conventions shown in Table 10-3.
Table 10-3 Supervisor Module Software Image Naming Conventions for MDS 9200 Series
Cisco MDS 9200 Series Switch Type 9222i 9216, 9216A or 9216i
Naming Convention Filename begins with m9200-s2ek9 Filename begins with m9200-s1ek9
Selecting the Correct Software Images for Cisco MDS 9500 Family Switches
The Supervisor-1 and Supervisor-2 modules supported by Cisco MDS 9500 Family switches require different system and kickstart images. You can determine which images to use on your switch by the naming conventions shown in Table 10-4.
10-5
Software Images
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 10-4 Supervisor Module Software Image Naming Conventions for MDS 9500 Series
Naming Convention Filename begins with m9500-sf2ek9 Filename begins with m9500-sf2ek9
During a software upgrade to Cisco SAN-OS 3.1(3), the CompactFlash CRC Checksum test runs automatically in the background. All modules that are online are tested and the installation stops if any modules are running with a faulty CompactFlash. When this occurs, the switch can not be upgraded until the situation is corrected. A system message displays the module information and indicates that you must issue the system health cf-crc-check module CLI command to troubleshoot. For descriptions of new commands supported by the CompactFlash checksum feature, refer to the Cisco MDS 9000 Family Command Reference. Before attempting to migrate to any software image version, follow these guidelines:
Customer Service Before performing any software upgrade, contact your respective customer service representative to review your software upgrade requirements and to provide recommendations based on your current operating environment.
Note
If you purchased Cisco support through a Cisco reseller, contact the reseller directly. If you purchased support directly from Cisco Systems, contact Cisco Technical Support at this URL: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml Scheduling Schedule the upgrade when the fabric is stable and steady. Ensure that everyone who has access to the switch or the network is not configuring the switch or the network during this time. All configurations are disallowed at this time.
Space Verify that sufficient space is available in the location where you are copying the images. This location includes the active and standby supervisor module bootflash: (internal to the switch).
Standby supervisor module bootflash: file system. Internal bootflash: offers approximately 200 MB of user space.
Hardware Avoid power interruption during any install procedure. These kinds of problems can corrupt the software image.
10-6
OL-25174-02
Chapter 10
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
Ensure the switch has a route to the remote server. The switch and the remote server must be in
the same subnetwork if you do not have a router to route traffic between subnets.
Images
Ensure that the specified system and kickstart images are compatible with each other. If the kickstart image is not specified, the switch uses the current running kickstart image. If you specify a different system image, ensure that it is compatible with the running kickstart
image.
Retrieve images in one of two ways:
Local fileImages are locally available on the switch. Network fileImages are in a remote location and the user specifies the destination using the remote server parameters and the file name to be used locally.
Terminology Table 10-5 summarizes terms used in this chapter with specific reference to the install and upgrade process.
Table 10-5
Definition The modules ability to boot or not boot based on image compatibility. The type of software upgrade mechanismdisruptive or nondisruptive. Resets the module. Resets the module immediately after switchover. Upgrades each module in sequence. Updates the software for BIOS, loader, or bootrom.
Tools
Verify connectivity to the remote server by clicking Verify Remote Server in the Software
wizard upgrades all modules in any Cisco MDS 9000 Family switch (see the Benefits of Using the Software Install Wizard section on page 10-3).
Run only one installation on a switch at any time. Do not issue another command while running the installation. Do the installation on the active supervisor module, not the standby supervisor module.
10-7
Software Images
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
Prior to Cisco SAN-OS Release 3.0, to preserve the FC IDs in your configuration, verify that the persistent FC ID feature is enabled before rebooting. This feature is enabled by default. In earlier releases, the default is disabled.
Note
The Software Install Wizard supports installation and upgrade for Cisco MDS 9020 Fabric Switch or Cisco FabricWare. For successful installation and upgrade, specify the TFTP server address that the Cisco MDS 9020 Fabric Switch should use.
Note
Before you use this wizard, be sure the standby supervisor management port is connected.
Default Settings
Table 10-6 lists the default image settings for all Cisco MDS 9000 Family switches.
Table 10-6 Default Image Settings
DETAILED STEPS
Step 1
Click the Software Install Wizard icon in the toolbar. You see the Select Switches dialog box with all switches selected by default. Deselect the check box for the switch(es) for which you do not want to install images on. You must have at least one switch selected to proceed . Click Next when finished. (Optional) Check the Skip Image Download check box and click Next to use images that are already downloaded (the file is already on the bootflash). Proceed to Step 11. You see the Specify Software Image(s) by Model Dialog Box. Click the Use Saved Settings check box to save the settings you specify. These settings will be saved for future use when you click Next.
Step 5
10-8
OL-25174-02
Chapter 10
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 6
Local FM TFTP to transfer files from local computer. Remote to transfer files from a remote computer.
If you select Local FM TFTP, proceed to Step 10. If you select Remote, click one of the Copy Files Via radio buttons transfers files (SFTP, SCP, FTP). Enter the server name, user name and password. Enter the version and the image path and then click Apply.
Note
You can manually provide the file name, if you had choosen Local FM TFTP in step 6. To do that you may double-click the table, and choose the file form the Open dialog box or manually type the file name in the cell under system.
When you enter the version string and image path, DCNM-SAN tries retrieves the default file name and the calculate the flash space required to accommodate the image file. Version string should be the current version of the version to be installed. Image path is the path to locate the software image as shown in the following example:
Image URI: /tftpboot/rel/qa/5_0_0_201/gdb/m9500-sf2ek9-mzg.5.0.0.201.bin.S2 Path /tftpboot/rel/qa/5_0_0_201/gdb Version String 5.0.0.201.S2
Step 11 Step 12
Click the row under the System, Kickstart or SSI columns to enter image URIs. You must specify at least one image for each switch to proceed. Click Verify Remote Server and Path. DCNM-SAN will validate the file path and server credentials. You see the output Click OK and then click Next in the Specify Software Images by Model dialog box. You see the Check Flash Free Space dialog box. This dialog box shows the active (and standby, if applicable) bootflash space on each switch, and shows the status (whether there is enough space for the new images). If any switch has insufficient space, you cannot proceed. Deselect the switch without enough bootflash by going back to the first screen and unchecking the check box for that switch.
Step 13
Step 14
Note Step 15
Serialized to upgrade one switch at a time. Parallel to simultaneously upgrade multiple switches.
Step 16 Step 17
(Optional) Check the Version Check Only check box to complete the version check first and then prompt for your input to continue with installation. (Optional) Click Finish to start installation. You see the Version Check Results dialog box .
10-9
Software Images
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 18
(Optional) Check the Install without Version check Prompting check box to continue with the installation.
Note
The version check provides information about the impact of the upgrade for each module on the switch. It also shows any incompatibilities that might result. You see a final dialog box at this stage, prompting you to confirm that this check should be performed. We recommend that you do not ignore the version check results.
Caution
If Install without Version check Prompting is checked, the upgrade will proceed even if the current switch version is newer than the version you are installing.
Step 19 Step 20
Click OK to close the wizard. Click Continue to install to start the installation. You see the Download and Install Status dialog box.
Note
On hosts where the TFTP server cannot be started, a warning is displayed. The TFTP server may not start because an existing TFTP server is running or because access to the TFTP port 69 has been denied for security reasons (the default setting on Linux). In these cases, you cannot transfer files from the local host to the switch.
Note
Before exiting the session, be sure the upgrade process is complete. The wizard will display a status as it goes along. Check the lower left-hand corner of the wizard for the status message Upgrade Finished. First, the wizard displays the message Success followed a few seconds later by InProgress Polling. Then the wizard displays a second message Success before displaying the final Upgrade Finished.
Each IPS module in a switch requires a 5-minute delay before the next IPS module is upgraded. Each CSM module requires a 30-minute delay before the next CSM module is upgraded. See the Cisco MDS 9000 Family SAN Volume Controller Configuration Guide for more information on CSMs.
10-10
OL-25174-02
Chapter 10
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Cisco MDS 9124 Multilayer Fabric Switch Cisco MDS 9134 Multilayer Fabric Switch Cisco MDS 9222i Multiservice Modular Switch Cisco Fabric Switch for HP c-Class BladeSystem Cisco Fabric Switch for IBM BladeCenter Preparing for a Nondisruptive Upgrade on Fabric and Modular Switches, page 10-11 Performing a Nondisruptive Upgrade on a Fabric Switch, page 10-12
Cisco MDS 9124 Multilayer Fabric Switch Cisco MDS 9134 Multilayer Fabric Switch Cisco MDS 9222i Multiservice Modular Switch Cisco Fabric Switch for HP c-Class BladeSystem Cisco Fabric Switch for IBM BladeCenter
When completed, the supervisor kickstart image, supervisor system image, the linecard image and the system BIOS are all updated. Nondisruptive upgrades on these fabric switches take down the control plane for not more than 80 seconds. In some cases, when the upgrade has progressed past the point at which it cannot be stopped gracefully, or if a failure occurs, the software upgrade may be disruptive.
Note
During the upgrade the control plane is down, but the data plane remains up. So new devices will be unable to log in to the fabric via the control plane, but existing devices will not experience any disruption of traffic via the data plane. Before attempting to upgrade any software images on these fabric switches, follow these guidelines:
During the upgrade, the fabric must be stable. None of the following configuration activities are allowed:
Zoning changes Telnet sessions Schedule changes Switch cabling Addition or removal of physical devices
10-11
Software Images
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Configure the FSPF timers to the default value of 20 seconds. If there are any CFS commits pending in the fabric, the upgrade is aborted. If there is a zone server merge in progress, the upgrade is aborted. Check whether there is sufficient space available in the system to load the new images using the Software Install Wizard. At this point you need to either abort the upgrade or proceed with a disruptive upgrade. On the Cisco MDS 18/4-port multiservice module, upgrades of the 4-Gigabit Ethernet ports for the hybrid Supervisor 18/4 line card will be disruptive.
Caution
It is recommended that you enable port-fast on the Ethernet interface of the Catalyst switch to which the management interface of the fabric switch is connected. This is to avoid spanning-tree convergence time on the Catalyst switch and packets from the fabric switch are forwarded immediately during the nondisruptive upgrade.
Note
When selecting images during the upgrade, ASM-SFN and SSI are not supported on the Cisco MDS 9124 Switch and the Cisco MDS 9134 Multilayer Fabric Switch.
Replacing Supervisor Modules, page 10-12 Migrating from Supervisor-1 Modules to Supervisor-2 Modules, page 10-13 Setting Standby Supervisor Module Boot Variable Version, page 10-13 Setting Standby Supervisor Module Bootflash Memory, page 10-13 Standby Supervisor Module Boot Alert, page 10-14
Note
You must remove and reinsert or replace the supervisor module to bring it into service.
10-12
OL-25174-02
Chapter 10
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Caution
Migrating your supervisor modules is a disruptive operation. When migration occurs from a Supervisor 1 to a Supervisor 2 module, a cold switchover occurs and both modules are reloaded. When the Supervisor 1 attempts to come up as the standby with the Supervisor 2 as the active supervisor, the standby is not brought up. For step-by-step instructions about migrating from Supervisor 1 modules to Supervisor 2 modules, refer to the Cisco MDS 9000 Family NX-OS and SAN-OS Software Upgrade and Downgrade Guide.
Note
DETAILED STEPS
Step 1 Step 2
Click Admin > Flash Files. Select the standby supervisor from the Partition drop-down list. At the bottom of the Flash Files dialog box, you see the space used and free space.
10-13
Software Images
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
This error message is also generated if one of the following situations apply:
You remain at the loader> prompt for an extended period of time. You do not set the boot variables appropriately.
Supervisor-2 modules can be installed on all Cisco MDS 9500 Series Directors.
Note
The Cisco MDS 9513 Director does not support Supervisor-1 modules. Generation 2 switching modules can be installed on all Cisco MDS 9000 Family switches, except the Cisco MDS 9216 switch. Generation 1 modules can be used with Cisco MDS 9000 Family switches. However, installing Generation 1 modules in combination with Generation 2 switching modules in the same chassis reduces the capabilities of the Generation 2 switching modules. Generation 1 and Generation 2 switching modules can be installed on Cisco MDS 9500 Family switches with either Supervisor-1 modules or Supervisor-2 modules.
Replacing Modules
When you replace any module (supervisor, switching, or services module), you must ensure that the new module is running the same software version as the rest of the switch. Refer to Cisco MDS 9000 Family SAN Volume Controller Configuration Guide for configuration details on replacing the Caching Services Module (CSM).
Note
When a spare standby supervisor module is inserted, it uses the same image as the active supervisor module. The Cisco NX-OS software image is not automatically copied to the standby flash device.
Tip
Use the Software Install Wizard to copy the Cisco NX-OS software image to the standby supervisor bootflash device. Using the Software Install Wizard after replacing any module, ensures the following actions:
The proper system and kickstart images are copied on the standby bootflash: file system.
10-14
OL-25174-02
Chapter 10
Software Images
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The proper boot variables are set. The loader and the BIOS are upgraded to the same version available on the active supervisor module.
DETAILED STEPS
Step 1 Step 2 Step 3
Create a backup of your existing configuration file, if required, by clicking Admin > Copy Configuration and selecting runningConfig to startupConfig. Replace the required module as specified in the Cisco MDS 9200 Series Hardware Installation Guide or the Cisco MDS 9500 Series Hardware Installation Guide. Verify that space is available on the standby supervisor bootflash by choosing Admin > Flash Files and selecting the sup-standby. It is a good practice to remove older versions of Cisco MDS NX-OS images and kickstart images. Use the Software Install Wizard to ensure that the new module is running the same software as the rest of the switch. Wait until the new module is online and then ensure that the replacement was successful by choosing Physical > Modules in Device Manager.
Step 4 Step 5
10-15
Chapter 10
Software Images
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
10-16
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
11
11-1
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
What do I do if the PortChannel creation dialog becomes too small after several uses?,
page 11-8
What do I do if I see errors after IPFC configuration?, page 11-8 What do I do if Cisco DCNM-SAN or Device Manager is using the wrong network interface?,
page 11-8
What do I do if I see display anomalies in Cisco DCNM-SAN or Device Manager?, page 11-9 Why is the active zone set in edit zone always shown in bold (even after successful activation)?,
page 11-9
Can I create a zone with prefix IVRZ or a zone set with name nozonset?, page 11-9 What do I do when One-Click License Install fails, and I cannot connect to the Cisco website?,
page 11-9
How do I increase the log window size in Cisco DCNM-SAN Client?, page 11-10 How do I increase the log window size in Cisco DCNM-SAN Client?, page 11-10 When do I do when the FM Server Database fails to start or has a file locking error?, page 11-10
page 11-11
page 11-19
Are there restrictions when using Cisco DCNM-SAN across FCIP?, page 11-19 How do I fix a "Please insure that FM server is running on localhost" message?, page 11-20 How do I run Cisco DCNM-SAN with multiple interfaces?, page 11-20 How do I configure an HTTP proxy server?, page 11-21 How do I clear the topology map?, page 11-22 How can I use Cisco DCNM-SAN in a mixed software environment?, page 11-22
11-2
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
How do I fix a "corrupted jar file" error when Launching Cisco DCNM-SAN?, page 11-22 How do I search for Devices in a Fabric?, page 11-23 How do I manage Multiple Fabrics?, page 11-24 How can I clear an Orange X Through a Switch caused by license expiration?, page 11-24
Installation Issues
When installing Cisco DCNM-SAN from windows, why does clicking install fail?
You can make sure that Java Web Start is installed properly.
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4
Go to the Programs menu and see if Java Web Start is there. Start the Java Web Start program to make sure there is no problem with the Java Runtime installation. Click the Preferences tab, and make sure the proxies settings are fine for Web Start. Check that your browser is set up to handle JNLP settings properly (see the How do I manually configure a browser for Java Web Start? section on page 11-5).
If you had older versions of the application and you see an error pop-up window saying cannot open the JNLP file (in the error details), this could be because the Java Web Start cache is messed up. To work around this, clear the cache and retry. To clear the cache, see the How do I clear the Java Web Start cache? section on page 11-5.
11-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
First, try clicking on the install links. If that does not work, check to see if the browser helper applications settings are correct (for example, for Netscape 6.0 Edit > Preferences > Navigator > Helper Applications ). See the How do I manually configure a browser for Java Web Start? section on page 11-5.
Close all running instances of Cisco DCNM-SAN or Device Manager. Point your browser at the switch running the new version and click the appropriate install link. Cisco DCNM-SAN or Device Manager prompts you to upgrade if the switch is running a newer version. The installer checks your local copies and updates any newer versions of the software.
11-4
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4
Start Java Web Start (javaws.exe or javaws). You see the Java Web Start Application Manager. Choose File > Preferences > General and make sure your proxy settings are correct. For example, if you are using an HTTP proxy, set it up here. Choose Use Browser. Click OK.
Description=Java Web Start File Extension=jnlp Mime Type=application/x-java-jnlp-file Application=path-to-javaws (e.g. /usr/local/javaws/javaws)
After setting this up, you may need to restart the browser. If you see "Java Web Start not detected" warnings, you can ignore them. These warnings are based on JavaScript, and not all browsers behave well with JavaScript. Click on the install links to install Cisco DCNM-SAN or Device Manager.
Note
For Windows Users: To set up Java Web Start on *.jnlp files, select Windows Explorer > Tools > Folder Options > File Types. Either change the existing setting for JNLP or add one so that *.jnlp files are opened by javaws.exe. This executable is under Program Files\Java Web Start
11-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
Go to File > Preferences > Advanced and clear the applications folder or cache. You can manually delete the .javaws or cache directory. On Windows this is under Documents and Settings, and on UNIX this is under $HOME.
What do I do if during a Cisco DCNM-SAN upgrade, the installer doesnt display a prompt to create a shortcut?
Clear the Java Web Start cache as described in How do I clear the Java Web Start cache? in this chapter.
Make sure that the management interface on the switch is up (show interface mgmt0). Check whether you can connect to the management interface (ping). Verify the username is valid (show snmp user). You can also add/edit the users through the CLI. If you have multiple network interfaces, see the What do I do if Cisco DCNM-SAN or Device Manager is using the wrong network interface? section on page 11-8
What do I do if I cannot install Cisco DCNM-SAN or Device Manager, or run Java, when pcAnyWhere is running?
You can either stop the pcAnyWhere service and install Cisco DCNM-SAN or Device Manager, or install/update DirectX. For more information,refer to the website at www.oracle.com
What do I do if the Cisco DCNM-SAN or Performance Manager service shows up as disabled in the Services menu?
This could happen if:
The service menu for Cisco DCNM-SAN or Performance Manager was open during an uninstall/upgrade. The Cisco DCNM-SAN client or Device Manager was running while doing an uninstall/upgrade.
This error happens when Windows is unable to delete a service completely. A reboot of the host should fix the problem.
11-6
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
What do I do if I am unable to install Cisco DCNM-SAN or Device Manager, or run Java, when McAfee Internet Suite 6.0 Professional is running?
The McAfee internet suite comes with a virus scanner, firewall, antispam, and privacy management. The privacy management can interfere with the Cisco DCNM-SAN server-client interactions. To work around this you must shut down the privacy service.
General
What do I do if I see errors while monitoring Area chart graphing?
When doing the area chart graphing from the monitor window, if you move the mouse over the Area chart before the first data comes back, you see a java.lang.ArrayIndexOutOfBoundsException error on the message log from JChart getX(). This is because JChart tries to locate a value that does not exist yet. This might be fixed in a future version of JChart.
What do I do if disk images in the Device Manager Summary View are not visible?
On some occasions the Summary View table in the Device Manager does not show the icons for disks attached to a Fx port. This is because the FC4 features are empty for this port. A LUN discovery must be issued to discover information about these hosts/disks that do not register their FC4 types. You can do this in the Device Manager by clicking FC > Advanced > LUNs.
What do I do if I am unable to set both the D_S_TOV and E_D_TOV timers in Device Manager?
If you modify both E_D_TOV and D_S_TOV at the same time, and the new D_S_TOV value is larger than the old E_D_TOV value, you will get a WrongValue error. To work around this, you must change the values separately.
11-7
Chapter 11 General
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
What do I do if fabric changes are not propagated onto the map (for example, links don't disappear)?
Cisco DCNM-SAN shows that a device or port is down by displaying a red cross on that port or device. However, Cisco DCNM-SAN does not remove any information that's already discovered. You must rediscover to correctly update the map.
What do I do if the PortChannel creation dialog becomes too small after several uses?
After several uses, the MemberList TextBox (in the PortChannel Create Window) does not display as it should. It changes from a long TextBox with a ComboBox for choosing ports, to a small square TextBox that is too small to choose ports. This is a known problem and will be fixed in a future release. To work around this problem, stop and restart Cisco DCNM-SAN or Device Manager.
What do I do if Cisco DCNM-SAN or Device Manager is using the wrong network interface?
The problem happens because the underlying Java library picks a local interface arbitrarily. To work around this, supply a command line argument before starting the Fabric/Device Manager. In the desktop shortcut or shell script or batch file, add the following parameter "-Device Managerds.nmsAddress=" For example, in Windows the line looks like ".javaw.exe -Device Managerds.nmsAddress=X.X.X.X -cp .". In desktop shortcuts, this length could exceed the maximum characters allowed. If this happens, delete the "-Dsun.java2d.ddoffscreen=false" portion to make more space. Releases 1.2 and later allow you to pick a preferred network interface.
11-8
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Why is the active zone set in edit zone always shown in bold (even after successful activation)?
A member of this VSAN must be participating in IVR zoning. Because the IVR zones get added to active zones, the active zone set configuration is always different from the local zone set configuration with the same name. The zone set name is always bold.
Can I create a zone with prefix IVRZ or a zone set with name nozonset?
Do not use these special names. These names are used by the system for identifying IVR zones.
What do I do when One-Click License Install fails, and I cannot connect to the Cisco website?
The one-click license install tries to open an HTTP connection to the Cisco website. If you do your browsing using an HTTP proxy then the following command- line variables need to be added to your Cisco DCNM-SAN client scripts:
-Dhttps.proxyHost and -Dhttps.proxyPort.
In case your one-click install URL starts with "http://" (and not "https://"), the variables are:
-Dhttp.proxyHost and -Dhttp.proxyPort.
For example, in Windows, edit the MDS 9000\bin\FabricManager.bat file and add to the JVMARGS "-Dhttps.proxyHost=HOSTADDRESS -Dhttps.proxyPort=HOSTPORT".
11-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
When do I do when the FM Server Database fails to start or has a file locking error?
In the database log (FMPersist.log) you will see an error message "The database is already in use by another process". The HsqlDB 1.7.1 version has this problem. The file lock problem seems to happen occasionally, and can be resolved by shutdown and restart of the db server. On windows this can be done by stopping and starting the FMPersist service and on Unix just run the FMPersist.sh script with the argument restart.
Windows Issues
What do I do when text fields show up too small, and I cannot enter any data?
When Reflection X is running, certain text fields in the Cisco DCNM-SAN and Device Manager are not rendered to the full width of the field. Resize the dialog box to see the text fields properly.
11-10
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
What do I do when Device Manager or Cisco DCNM-SAN window content disappears in Windows XP?
Device Manager or Cisco DCNM-SAN main window content disappears in Windows XP due to a Java bug. Refer to the following website: http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=4919780. Minimize or maximize the window and restore to the normal size to restore the window content. Disabling Direct Draw may also prevent this from happening by adding "-Dsun.java2d.noddraw=true" to JVMARGS in <FM-install-dir>/bin/FabricManager.bat and DeviceManager.bat
What do I do when SCP/SFTP fails when a file is copied from local machine to the switch?
If there are embedded spaces in the file path, then windows scp/sftp might fail. You will get a copyDeviceBusy error from the switch. In tools such as the License Wizard either make sure tftp copy can be done or pick filenames with no spaces.
11-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
UNIX Issues
What do I do when the parent menus disappear?
Displaying a submenu may occasionally cause the parent menu to disappear. For more details on this bug, refer to: http://developer.java.sun.com/developer/bugParade/bugs/4470374.html.
What do I do when the web browser cannot find web server even it is running?
This can happens when web browser uses proxy server. To check that for Internet Explorer, choose tools in menu, then choose internet options, then choose connection subpanel, then click Lan Setting. A dialog comes up, verify the proxy setting.
System Preferences Make sure the system level preferences are stored on a local disk. The system preferences are stored in $JAVA_HOME/.systemPrefs where JAVA_HOME is where you have installed the JDK. If this directory is NFS mounted, then just do the following:
$ rm -rf $JAVA_HOME/.systemPrefs< $ mkdir /tmp/.systemPrefs $ ln -s /tmp/.systemPrefs $JAVA_HOME/.systemPrefs
The problem with this workaround is that you have to make sure /tmp/.systemPrefs exists on every box where you are using $JAVA_HOME. We recommend installing the JVM as root and on a local disk.
User Preferences If your home directory is NFS mounted and you are getting this problem. Do the following:
$ rm -rf $HOME/.java $ mkdir /tmp/.java.$USER $ ln -s /tmp/.java.$USER $HOME/.java
11-12
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Other
How do I set the map layout so it stays after Cisco DCNM-SAN restarted?
You can arrange the map to your liking and would like to freeze the map so that the objects stay as they are even after you stop Cisco DCNM-SAN and restart it again.
DETAILED STEPS
Step 1 Step 2
Right-click in a blank space in the map. You see a menu. Select Layout > Fix All Nodes from the menu.
What do I do when two switches show on the map, but there is only one switch?
If two switches show on your map, but you only have one switch, it may be that you have two switches in a non-contiguous VSAN that have the same Domain ID. Cisco DCNM-SAN uses <vsanId><domainId> to look up a switch, and this can cause the fabric discovery to assign links incorrectly between these errant switches. The workaround is to verify that all switches use unique domain IDs within the same VSAN in a physically connected fabric. (The fabric configuration checker will do this task.)
Definition Cannot communicate with a switch via SNMP. Cannot communicate with or see a switch in the Domain Manager/Fabric Configuration Server list of fabric switches. Definition Port up.
Device Manager Color Green Square with Mode (e.g., F, T, TE, U/I for FICON)
11-13
Chapter 11 Other
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 11-1 Cisco DCNM-SAN Client and Device Manager Color Definitions (continued)
Cisco DCNM-SAN Color Orange Square with Mode Orange Cross Brown Square Light Gray Square Red Cross Red Square No Square or Black Square
Definition Trunk incomplete. Ols or Nos received. Port is administratively down. Port is not manageable. HardwareFailure/LoopbackDiagFailure/LinkFail ure Any other kind of configuration failure. Port not yet configured.
Table 11-2
Definition The port is administratively down. Bit error rate too high. Misconfiguration in PortChannel membership detected. This port is a member of a PortChannel and that PortChannel is administratively down. This port is undergoing a PortChannel configuration. This port is a member of a PortChannel and its operational parameters are incompatible with the PortChannel parameters. Suspended due to port binding. The elected principal switch is not capable of performing domain address manager functions so no Nx_port traffic can be forwarded across switches, hence all Interconnect_Ports in the switch are isolated. Invalid RCF received. Domain manager is disabled. Domain manager failure after maximum retries. The peer E port is isolated. There is a overlap in domains while attempting to connect two existing fabrics. Isolated for ELP failure due to class F parameter error. Isolated for ELP failure due to class N parameter error.
deniedDueToPortBinding domainAddrAssignFailureIsolation
11-14
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 11-2 Device Manager Tooltip Definitions (continued)
Definition Isolated for ELP failure due to invalid flow control parameter. Isolated for ELP failure due to invalid payload size. Isolated for ELP failure due to invalid port name. Isolated for ELP failure due to invalid switch name. Isolated for ELP failure due to invalid transmit B2B credit. During a port initialization the prospective Interconnect_Ports find incompatible link parameters. Isolated for ELP failure due to loopback detected. Isolated for ELP failure due to R_A_TOV or E_D_TOV mismatch. Isolated for ELP failure due to revision mismatch. Isolated for ELP failure due to invalid flow control code. Port down because FICON prohibit mask in place for E/TE port. Trunk negotiation protocol failure after maximum retries. The port is not operational due to some error conditions that require administrative attention. During a port initialization the prospective Interconnect_Ports are unable to proceed with initialization as a result of Exchange Switch Capabilities (ESC). fabric bindingactive database mismatch with peer. Peer domain ID is invalid in fabric binding active database. Fabric binding no response from peer. Peer switch WWN not found in fabric binding active database. FCIP port went down due to configuration change. FCIP port went down due to TCP keep alive timer expired. FCIP port went down due to max TCP retransmissions reached the configured limit.
11-15
Chapter 11 Other
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 11-2 Device Manager Tooltip Definitions (continued)
Tooltip fcipPortPersistTimerExpire fcipPortSrcAdminDown fcipPortSrcLinkDown fcipSrcModuleNotOnline fcipSrcPortRemoved fcotChksumErr fcotNotPresent fcotVendorNotSupported fcspAuthenfailure ficonBeingEnabled ficonNoPortnumber ficonNotEnabled ficonVsanDown firstPortNotUp
Definition FCIP port went down due to TCP persist timer expired. FCIP port went down because the source ethernet link was administratively shutdown. FCIP port went down due to ethernet link down. FCIP port went down due to source module not online. FCIP port went down due to source port removal. FSP SPROM checksum error. SFP (GBIC) not present. FSP (GBIC) vendor is not supported. Fibre Channel security protocol authorization failed. FICON is being enabled. No FICON port number. FICON not enabled. FICON VSAN is down. In a over subscribed line card, first port cannot be brought up in E mode when the other ports in the group are up. In a over subscribed line card, when the first port in a group is up in E mode, other ports in that group cannot be brought up. Hardware failure. Disabled due to incompatible admin port rxbbcredit, performance buffers. Port admin mode is incompatible with port capabilities. Receive BB credit is incompatible. Receive buffer size is incompatible. Port speed is incompatible with port capabilities. The port is being initialized. Interface is being removed. Invalid attachment. This port has a misconfiguration with respect to port channels. Invalid fabric binding exchange. Link failure due to excessive credit loss indications.
firstPortUpAsEport
hwFailure incomAdminRxBBCreditPerBuf incompatibleAdminMode incompatibleAdminRxBBCredit incompatibleAdminRxBufferSize incompatibleadminSpeed initializing interfaceRemoved invalidAttachment invalidConfig invalidFabricBindExh linkFailCreditLoss
11-16
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 11-2 Device Manager Tooltip Definitions (continued)
Tooltip linkFailCreditLossB2B linkFailDebounceTimeout linkFailLineCardPortShutdown linkFailLinkReset linkFailLIPF8Rcvd linkFailLIPRcvdB2B linkFailLossOfSignal linkFailLossOfSync linkFailLRRcvdB2B linkFailNOSRcvd linkFailOLSRcvd linkFailOPNyRETB2B linkFailOPNyTMOB2B linkFailPortInitFail linkFailPortUnusable linkFailRxQOverFlow linkFailTooManyINTR linkFailure loopbackDiagFailure loopbackIsolation noCommonVsanIsolation none nonParticipating offline ohmsExtLBTest other parentDown
Definition Link failure when link reset (LR) operation fails due to queue not empty. Link failure due to re-negotiation failed. Link failure due to port shutdown. Link failure due to link reset. Link failure due to F8 LIP received. Link failure when loop initialization (LIP) operation fails due to non empty receive queue. Link failure due to loss of signal. Link failure due to loss of sync. Link failure when link reset (LR) operation fails due to non-empty receive queue. Link failure due to non-operational sequences received. Link failure due to offline sequences received. Link failure due to open primitive signal returned while receive queue not empty. Link failure due to open primitive signal timeout while receive queue not empty. Link failure due to port initialization failure. Link failure due to port unusable. Link failure due to receive queue overflow. Link failure due to excessive port interrupts. Physical link failure. Loopback diagnostics failure. Port is connected to another port in the same switch. Trunk is isolated because there are no common vsans with peer. No failure. During loop initialization, the port is not allowed to participate in loop operations Physical link is in offline state as defined in the FC-FS standards. Link suspended due to external loopback diagnostics failure. Undefined reason. The physical port to which this interface is bound is down.
11-17
Chapter 11 Other
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 11-2 Device Manager Tooltip Definitions (continued)
Tooltip peerFCIPPortClosedConnection peerFCIPPortResetConnection portBindFailure portBlocked portChannelMembersDown portFabricBindFailure portGracefulShutdown portVsanMismatchIsolation rcfInProgres
Definition Port went down because peer FCIP port closed TCP connection. Port went down because the TCP connection was reset by the peer FCIP port. Port got isolated due to port bind failure. Port blocked due to FICON. No operational members. Port isolated due to fabric bind failure. Port shutdown gracefully. An attempt is made to connect two switches using non-trunking ports having different port VSANs. An isolated xE_port is transmitting a reconfigure fabric, requesting a disruptive reconfiguration in an attempt to build a single, non-isolated fabric. Only the Interconnect_Ports can become isolated. No source port is specified for this interface. Port that belongs to a port channel is suspended due to incompatible operational mode. Port that belongs to a port channel is suspended due to incompatible operational speed. Port that belongs to a port channel is suspended due to incompatible remote switch WWN. Software failure. Suspended due to too many invalid FLOGIs. Link isolation due to TOV mismatch Some of the VSANs which are common with the peer are not up. Line card upgrade in progress. Port VSAN is inactive. The port becomes operational again when the port VSAN is active. This VSAN is not configured on both sides of a trunk port. The two Interconnect_Ports cannot merge zoning configuration after having exchanged merging request for zoning. Isolation due to remote zone server not responding.
srcPortNotBound suspendedByMode suspendedBySpeed suspendedByWWN swFailure tooManyInvalidFLOGIs tovMismatch trunkNotFullyActive upgradeInProgress vsanInactive vsanMismatchIsolation zoneMergeFailureIsolation
zoneRemoteNoRespIsolation
11-18
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
How do I preserve historical data when moving Cisco DCNM-SAN server to new host?
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4
Export the enclosures to a file. Reinstall Cisco DCNM-SAN (if you are installing on a new host, install Cisco DCNM-SAN). After the installation is complete, stop Cisco DCNM-SAN Server. Copy the RRD files from the old host to the new host. Place it in the database directory (on a Windows PC, the default installation location for this directory is C:\Program Files\Cisco Systems\DCM\fm\pm\db). On the new host, run PM.bat sync from the $INSTALLDIR\dcm\fm\bin folder. This creates files and a new directory structure. There is a directory for each switch for which you have collected data. Continue to collect data on a specific switch by copying the db subfolder from that switchs folder to the pm folder. Restart Cisco DCNM-SAN Server. Add the fabric to Performance Manager Collection. Reimport the enclosures on the new host. Be sure to turn off the original service on the old host.
11-19
Chapter 11 Other
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4
Open the server.properties file in the Cisco DCNM-SAN installation directory. On a Windows platform, this file is in C:\Program Files\Cisco Systems\dcm by default. Comment out the line: snmp.localaddress. Save and exit the file. Restart Cisco DCNM-SAN server.
Note
There are some cases where you would not want to do this, and should manually select the interface that Cisco DCNM-SAN uses. For more information, see theHow do I run Cisco DCNM-SAN with multiple interfaces? section on page 11-20.
If you add an interface after you have installed Cisco DCNM-SAN Server and/or Performance Manager If you decide to use a different interface than the one you initially selected If for any reason one of the Cisco DCNM-SAN applications did not detect multiple interfaces Manually specifying an interface for Cisco DCNM-SAN Server, page 11-21 Manually specifying an interface for Cisco DCNM-SAN Client or Device Manager, page 11-21
Refer to the following sections, depending on which application you want to recognize the interface.
11-20
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Go to the MDS 9000 folder. On a Windows platform, this folder is at C:\Program Files\Cisco Systems\MDS 9000 by default. Edit the server.properties file with a text editor. Scroll until you find the line: snmp.localaddress. If the line is commented, remove the comment character. Set the local address value to the IP address or interface name of the NIC you want to use. Save the file. Stop and restart Cisco DCNM-SAN Server.
Go to the MDS 9000/bin folder. On a Windows platform, this folder is at C:\Program Files\Cisco Systems\MDS 9000 by default. Edit the DeviceManager.bat file or the FabricManager.bat file. Scroll to the line that begins with set JVMARGS= Add the parameter -Device Managerds.nmsaddress=ADDRESS, where ADDRESS is the IP address or interface name of the NIC you want to use. Save the file and relaunch Cisco DCNM-SAN Client or Device Manager.
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4 Step 5
Launch the Java Web Start application. Choose File > Preferences from the Java WebStart Application Manager. Choose the Manual radio button and enter the IP address of the proxy server in the HTTP Proxy field. Enter the HTTP port number used by your proxy service in the HTTP Port field. Click OK.
11-21
Chapter 11 Other
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
Click the Refresh Map icon in the Fabric pane. This clears the information from the client. Click Purge Down Elements in the Server menu. This clears the information from the server.
Step 2
Caution
How do I fix a "corrupted jar file" error when launching Cisco DCNM-SAN?
If you get the following error:
An error occurred while launching the application Cisco DCNM-SAN. download error:corrupted jar file at <ipaddress>\Device Managerboot.jar
(Where <ipaddress> is that of the switch) The error message you are getting indicates that the Java Web Start cache is corrupted. You can try clearing your Java Web Start cache first. To clear the Cache either run Java Web Start (from the Programs menu) and under the preferences select clear cache. Or do it manually by first making sure all Cisco DCNM-SAN or Device Manager instances are closed and then deleting .javaws/cache. In the newer JREs this directory is created under Documents and Settings\USERNAME and in the older ones it used to be under Program Files\Java Web Start. You can also browse beneath the cache folder and delete the offending IPAddress folder (e.g. cache/http/D10.0.0.1). Also, check to make sure that the host is not running a virus checker / java blocker? You also can run the uninstall program and delete .cisco_mds directory, and then reinstall Cisco DCNM-SAN.
11-22
OL-25174-02
Chapter 11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
Right-click the map and choose Find Elements from the drop-down menu. You see the Find Fabric dialog box as shown in Figure 11-1. Choose End Device from the left drop-down list. Choose Port WWN from the right drop-down list. You can also enter only part of the WWN and use a wildcard (*) character (for example, you can enter *fb*f8).
Figure 11-1 Find Fabric Dialog Box with End Device and Port WWN Selected
Step 2 Step 3
Step 4
Click Find in Map. To search for devices in a zone, click Find in Zones. You see the device highlighted in the Fabric pane. Right-click any device to see the attributes for that device. You can also select a link leading to a device to see the attributes for the link.
DETAILED STEPS
Step 1
Click the Find icon from the tool bar. You see the Find dialog box.
11-23
Chapter 11 Other
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2 Step 3 Step 4 Step 5 Step 6 Step 7
Enter the search string in the Find text box. Click Selection to search in selected row(s). Check Ignore Case to ignore case sensitivity. Check Exact Match to search for the data value exactly matching the search string. Click Next to search. Click Cancel to close the dialog box.
11-24
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
PA R T
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
12
Overview of DCNM-LAN
This chapter provides a brief overview of Cisco Data Center Network Manager for LAN (DCNM-LAN). For information about the specific Cisco Nexus products supported by DCNM-LAN, see the Cisco DCNM Release Notes, Release 5.x. This chapter includes the following sections:
DCNM-LAN Client and Server, page 12-1 Features in Cisco DCNM-LAN, Release 5.2, page 12-2 Documentation About DCNM-LAN, page 12-3
DCNM Client
DCNM Server
192321
12-1
Overview of DCNM-LAN
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Ethernet switching
Physical and virtual ports Port channels and virtual port channels (vPCs) Loopback and management interfaces VLAN network interfaces (sometimes referred to as switched virtual interfaces or SVIs) VLANs and private VLANs (PVLAN) Spanning Tree Protocol, including Rapid Spanning Tree (RST) and Multiple Spanning Tree
Protocol (MST)
Fabric Extender Link-state tracking Serial Over LAN Chassis Internal Network Fibre-Channel-over-Ethernet Initiation Protocol (FIP) snooping Port profiles
Ethernet routing
Gateway Load Balancing Protocol (GLBP), object tracking, and keychain management Hot Standby Router Protocol (HSRP)
Network security
Access control lists IEEE 802.1X Authentication, authorization, and accounting (AAA) Role-based access control Dynamic Host Configuration Protocol (DHCP) snooping Dynamic Address Resolution Protocol (ARP) inspection IP Source Guard Traffic storm control Port security
General
Virtual Device Context Hardware resource utilization with Ternary Content Addressable Memory (TCAM) statistics Switched Port Analyzer (SPAN)
DCNM-LAN includes the following features for assistance with management of your network:
12-2
OL-25174-02OL-25174-02
Chapter 12
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Device groups Event browser Configuration Delivery Management Configuration Change Management Device OS Management Hardware and virtual switch inventory DCNM-LAN server user accounts Device discovery Automatic synchronization with discovered devices Statistical data collection management DCNM-LAN server and client logging DCNM-LAN server cluster administration
Platform Support
DCNM-LAN supports the following platforms:
Cisco Nexus 1000V switches Cisco Nexus 2000 Fabric Extenders Cisco Nexus 3000 Series switches Cisco Nexus 4000 Series switches Cisco Nexus 5000 Series switches Catalyst 6500 DCNM-LAN provides limited support for the Catalyst 6500 Series switches that runs classic IOS version 12.2(33)SXI or higher.
DCNM-LAN supports the viewing of the current configuration attributes of the device. DCNM-LAN does not support changing the configuration of the device. DCNM-LAN supports the Firewall Service Module (FWSM) version 4.0 or higher for the
12-3
Overview of DCNM-LAN
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
12-4
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
13
Information About Installing and Launching the DCNM-LAN Client, page 13-1 Prerequisites for Installing and Launching the DCNM-LAN Client, page 13-2 Secure Client Communications, page 13-2 Default Administrator Credentials, page 13-3 Downloading and Launching the DCNM-LAN Client, page 13-3 Restarting the DCNM-LAN Client, page 13-7 Logging Into the DCNM-LAN Client, page 13-7 Uninstalling the DCNM-LAN Client, page 13-8 Additional References, page 13-9 Feature History for Installing and Launching the DCNM-LAN Client, page 13-10
13-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Your system must be running a supported operating system to install and use the DCNM-LAN client software. For more information about client system requirements, see the Cisco DCNM Release Notes, Release 5.x, which are available at the following site: http://www.cisco.com/en/US/products/ps9369/tsd_products_support_series_home.html The installation process uses Java version 1.6.0_21. If your system does not have that version of Java, the installation process will install it to your system. The DCNM-LAN client installer requires Internet access to download the Java version 1.6.0_21 JRE. If the system cannot access the Internet, use another system to download the Java installer and copy it to the system that you want to install the DCNM-LAN client on. You can download Java version 1.6.0_21 JRE from the Oracle Technology Network website. If your network environment requires a proxy connection to permit the download of the Java installer, ensure that the proxy settings are configured in Internet Options, available from the Control Panel.
Some DCNM-LAN features require a license. Before you can use licensed features, install the DCNM-LAN license. For more information about licensed features or for more information about the license installation, see the Cisco DCNM Installation and Licensing Guide, Release 5.x.
13-2
OL-25174-02OL-25174-02
Chapter 13
Installing and Launching the Cisco DCNM-LAN Client Default Administrator Credentials
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Using a Web Browser to Download and Launch the DCNM-LAN Client, page 13-3 Using a Command Prompt to Download and Launch the DCNM-LAN Client, page 13-5 Using a Command Prompt to Download and Launch the DCNM-LAN Client without using Java Web Start Launcher, page 13-6
DETAILED STEPS
Step 1
On the computer that you want to use the DCNM-LAN client on, open a web browser and go to the following address: http://server_IP_address_or_DNS_name:web_server_port/dcnm-client/index.html For example, if the DCNM-LAN server IP address is 172.0.2.1 and the web server port is 8080, use the following address:
13-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
http://172.0.2.1:8080/dcnm-client/index.html
Click Launch DCNM Client. The DCNM-LAN server sends the dcnm.jnlp file to the browser. This file should be opened with the Java Web Start Launcher.
Step 3
If the browser prompts you, choose to open the dcnm.jnlp file. You do not need to save the file. The DCNM-LAN client installer verifies that Java is already installed on your system. If the installer does not find the supported version of Java on the computer, the installer prompts you to install Java version 1.6.0_21.
Note
The Cisco DCNM client installer requires Internet access to download the Java version 1.6.0_21 JRE. If the system cannot access the Internet, use another system to download the Java installer, copy it to the system that you want to install the Cisco DCNM client on, install Java, and restart the Cisco DCNM client installation. You can download Java version 1.6.0_21 JRE from the Oracle Technology Network website. If your network environment requires a proxy connection to permit the download of the Java installer, ensure that the proxy settings are configured in Internet Options, available from the Control Panel.
Step 4
If the installer prompts you to install Java version 1.6.0_21, follow these steps:
a. b. c.
Click OK to begin installing the supported version of Java. If a security warning notifies you that the Java installer was digitally signed by an expired certificate, click Run to continue the installation. Complete the Java installation wizard.
Tip
To specify whether the supported version of Java is the default version used by browsers installed on the computer, choose Custom setup on the License Agreement dialog box. Later in the Java installation, on the Browser Registration dialog box, you can specify the browsers that should use the Java version that is supported by DCNM-LAN.
Note
You might need to wait a minute or longer while the installer installs the software.
The DCNM-LAN client login window opens. For detailed login steps, see the Logging Into the DCNM-LAN Client section on page 13-7.
13-4
OL-25174-02OL-25174-02
Chapter 13
Installing and Launching the Cisco DCNM-LAN Client Downloading and Launching the DCNM-LAN Client
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1 Step 2
On the computer that you want to use the DCNM-LAN client on, access a command prompt. Use the cd command to change the directory to the bin directory under the Java version 1.6.0_21 installation directory, as follows: cd path where path is the relative or absolute path to the bin directory. For example, on Microsoft Windows, the default path to the Java version 1.6.0_21 bin directory is C:\Program Files\dcm\Java\jre1.6.0_21\bin.
Step 3
The Java Web Start Launcher retrieves the dcnm.jnlp file from the DCNM-LAN server and installs the DCNM-LAN client on the computer.
Note
You might need to wait a minute or longer while the installer installs the software.
The DCNM-LAN client login window opens. For detailed login steps, see the Logging Into the DCNM-LAN Client section on page 13-7.
13-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Using a Command Prompt to Download and Launch the DCNM-LAN Client without using Java Web Start Launcher
You can use a command prompt to download and launch the DCNM-LAN client in standalone mode without using the Java Web Start Launcher.
Note
The Cisco DCNM-SAN cross launch feature is not supported when the DCNM-LAN client is installed in standalone mode. (The DCNM-LAN client in standalone mode is not a Java Web Start application.)
DETAILED STEPS
Step 1
Access a command prompt on the computer where the DCNM-LAN server is installed and navigate to the directory where the DCNM-LAN server is installed.
On a Windows DCNM-LAN server, the DCNM-LAN server is installed in <DCNM_INSTALL_LOCATION>\dcm\dcnm\ui-client directory. The default for <DCNM_INSTALL_LOCATION> is C:\Program Files\Cisco Systems. On a RHEL DCNM-LAN server, the DCNM-LAN server is installed in <DCNM_INSTALL_LOCATION>/dcm/dcnm/ui-client directory. The default for <DCNM_INSTALL_LOCATION> is /usr/cisco. On a Windows DCNM-LAN server, run construct_DCNM_LAN_SA_Client.bat. On a RHEL DCNM-LAN server, run construct_DCNM_LAN_SA_Client.sh.
Step 2
Step 3 Step 4
Copy the ui-client directory to the computer that you want to run the DCNM-LAN client on. On the computer that you are preparing for the DCNM-LAN client, access a command prompt and set JAVA_HOME to the location where the Java JRE is installed. For example:
For Microsoft Windows: set JAVA_HOME=C:\Program Files\Java\jre1.6.0_21 For RHEL: export JAVA_HOME=/usr/java/jre1.6.0_21
Step 5 Step 6
On the computer that you are preparing for the DCNM-LAN client, navigate to the ui-client directory that was copied from the DCNM-LAN server. In the ui-client directory, locate and run the dcnm-client-sa script to launch the DCNM-LAN client.
On a Windows DCNM-LAN server, run dcnm-client-sa.bat. On a RHEL DCNM-LAN server, run dcnm-client-sa.sh.
13-6
OL-25174-02OL-25174-02
Chapter 13
Installing and Launching the Cisco DCNM-LAN Client Restarting the DCNM-LAN Client
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The DCNM-LAN client login window opens. For detailed login steps, see the Logging Into the DCNM-LAN Client section on page 13-7.
If the locally installed DCNM-LAN client is the same version as the DCNM-LAN client that is available on the DCNM-LAN server, the DCNM-LAN client window opens quickly. If the locally installed DCNM-LAN client is older than the version of the DCNM-LAN client that is available on the DCNM-LAN server, the DCNM-LAN client automatically downloads from the DCNM-LAN server and replaces the locally installed DCNM-LAN client before the DCNM-LAN client window opens.
For detailed login steps, see the Logging Into the DCNM-LAN Client section on page 13-7.
A valid DCNM-LAN username and password. The IP address or DNS name of the DCNM-LAN server. In a clustered-server deployment, this should be the IP address or DNS name of the master server. The DCNM-LAN server port number. By default, the server port number is 1099. Proxy server address, HTTP port number, and Socks port number, if a proxy server is required by your network environment.
DETAILED STEPS
Step 1
Start the DCNM-LAN client. If you have previously downloaded and launched the DCNM-LAN client on the computer, you can start the client by using one of the shortcuts added to the computer by the client installer. For more information about downloading and launching the client, see one of the following topics:
Using a Web Browser to Download and Launch the DCNM-LAN Client, page 13-3 Using a Command Prompt to Download and Launch the DCNM-LAN Client, page 13-5
13-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
In the DCNM-LAN Server field, enter the DNS name or the IP address of the DCNM-LAN server. By default, this field lists the address or name specified the last time the client logged into a server. If you are logging into the client after downloading it, this field lists the address of the server that you downloaded the client from.
Note
If your DCNM-LAN deployment uses a clustered-server environment, enter the DNS name or IP address of the master DCNM-LAN server.
Step 3
In the Username field, enter your DCNM-LAN username. If you are logging into DCNM-LAN for the first time after installing the server, enter the local administrator name that you specified during the server installation. For more information, see the Default Administrator Credentials section on page 13-3. In the Password field, enter the password for the DCNM-LAN username that you specified. (Optional) If you need to change the DCNM-LAN server port, do the following:
a. b.
Step 4 Step 5
If the Port field is not visible, click More >>. Enter the port number in the Port field. The default DCNM-LAN server port number is 1099; however, you can specify a different port number when you install or reinstall the DCNM-LAN server.
Step 6
(Optional) If you need to use a proxy server to connect to the DCNM-LAN server, do the following:
a. b.
If the Connect to the DCNM-LAN server with a proxy server check box is not visible, click More >>. Check Connect to the DCNM-LAN server with a proxy server. The Proxy Server area appears below the check box. In the Address field, enter the IP address of the proxy server. In the HTTP Port and Socks Port fields, enter the port numbers on which the proxy server accepts HTTP and Socks connections. (Optional) If the proxy server requires authentication, check Authentication and enter a valid username and password in the fields provided.
c. d. e. Step 7
Click Login. The DCNM-LAN client opens. For information on how to use the DCNM-LAN client, see Chapter 14, Using the Cisco DCNM-LAN Client.
DETAILED STEPS
Step 1
Click Start > Control Panel > Java. The Java Control Panel dialog box opens. In the General tab, under Temporary Internet Files, click Settings.
Step 2
13-8
OL-25174-02OL-25174-02
Chapter 13
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The Temporary File Settings dialog box appears.
Step 3
Click View Applications. The Java Application Cache Viewer dialog box opens. Select the DCNM-LAN Client application and click Remove Selected Application. Java uninstalls the DCNM-LAN client image from your computer. Close the Java Application Cache Viewer. On the Temporary File Settings dialog box, click OK. On the Java Control Panel dialog box, click OK. If you want to reinstall the DCNM-LAN client, see the Downloading and Launching the DCNM-LAN Client section on page 13-3.
Step 4
Additional References
For additional information related to installing and launching the DCNM-LAN client, see the following sections:
Related Documents
Related Topic How to use the DCNM-LAN client Starting or stopping a DCNM-LAN server The process of deploying DCNM-LAN in your organization Installing a DCNM-LAN server Document Title Chapter 14, Using the Cisco DCNM-LAN Client Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers Cisco DCNM Installation and Licensing Guide, Release 5.x Cisco DCNM Installation and Licensing Guide, Release 5.x
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
13-9
Chapter 13 Feature History for Installing and Launching the DCNM-LAN Client
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Feature Name Using a command prompt to download the client. Proxy support for the DCNM-LAN client.
Feature Information Support was added for this feature. Support was added for this feature.
13-10
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
14
Information About the DCNM-LAN Client, page 14-1 Opening the DCNM-LAN Client, page 14-8 Closing the DCNM-LAN Client, page 14-9 Deploying Changes, page 14-10 Working with Statistics and Charts, page 14-10 Configuring Global Preferences, page 14-15 Using Online Help, page 14-18 Additional References, page 14-18 Feature History for Using the DCNM-LAN Client, page 14-19
User Interface, page 14-2 Feature Selector Pane, page 14-2 Contents Pane, page 14-3 Summary Pane, page 14-3 Details Pane, page 14-3 Association Pane, page 14-4 Menus, page 14-5 Toolbars, page 14-6 Keyboard Commands, page 14-7 Multiple Platform Support, page 14-7
14-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
User Interface
The DCNM-LAN client user interface, shown in Figure 14-1, presents device status information and provides configuration tools that allow you to manage devices. It is divided into the panes shown in Figure 14-1. When you want to view information about a specific object in a managed device or want to perform a configuration task, you use the panes in the order shown in Figure 14-1.
Figure 14-1 DCNM-LAN Client User Interface
1 2
3 4
14-2
OL-25174-02OL-25174-02
Chapter 14
Using the Cisco DCNM-LAN Client Information About the DCNM-LAN Client
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Contents Pane
The Contents pane, shown in Figure 14-1, displays information about the currently selected feature and provides fields for configuring that feature. The Contents pane contains two smaller panes: the Summary pane and the Details pane.
Summary Pane
The Summary pane, shown in Figure 14-1, displays an organized set of objects that you can view information about or perform actions on. The type of objects that appear depends upon the currently selected feature. For example, if you choose Interfaces > Physical > Ethernet from the Feature Selector pane, the Summary pane shows a table of devices. You can expand the managed devices to view the slots that contain network interface cards. You can expand the slots to view the interfaces they contain and key information about the status of the interfaces, such as the port mode, administrative status, and operational status. For most features, the title bar for the Summary pane shows what you have selected. After you choose the object that you want to view or configure, the Details pane displays information about the selected object, such as an Ethernet interface.
Exporting the Summary Pane
You can export the data shown in the Summary pane to a spreadsheet in Microsoft Excel 97-2003 format. To do so, click the green arrow in the upper-right corner of the Summary pane and specify the filename and location for the spreadsheet.
Filtering the Summary Pane
For many features, you can filter the objects that appear in the Summary pane. If filtering is supported for the feature that you selected, you can enable filtering from the menu bar by choosing View > Filter. In the Summary pane, the columns that you can use to filter the objects become drop-down lists. To filter the Summary pane, use the drop-down column heading lists to limit the objects that appear.
Details Pane
The Details pane, shown in Figure 14-1, shows information and configuration fields that are specific to the object that you selected in the Summary pane. The Details tab is often further divided into tabs. You can click on a tab to view its contents. This section includes the following topics:
Tabs
Tabs organize related fields and information. For example, as shown in Figure 14-1, when you select an Ethernet interface, four tabs appear in the Details pane, such as the Port Details tab. The following two special tabs often appear in the Details pane for many of the types of objects that you can choose from the Summary pane:
StatisticsYou can use this tab to work with statistics and charts related to the selected object. For more information, see the Working with Statistics and Charts section on page 14-10.
14-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
EventsYou can use this tab to view feature-specific events about the selected object. For more information, see the System Management Configuration Guide, Cisco DCNM for LAN, Release 5.x.
Sections
Sections provide further organization of related fields and information. The DCNM-LAN client allows you to expand and collapse sections so that you can show or hide fields and information as needed. For example, as shown in Figure 14-1, on the Port Details tab, the Basic Settings section is expanded but the Port Mode Settings section is collapsed.
Association Pane
The DCNM-LAN client also includes the Association pane, which allows you to access objects that you have configured in features that are associated with the currently selected feature. Figure 14-2 shows the Association pane. When tabs appear on the right side of the DCNM-LAN client, you can click on them to access the Association pane. For example, as shown in Figure 14-2, if you are configuring an Ethernet interface, you can use the Association pane to access the IPv4 ACLs that you can apply to the interface. If you right-click on an IPv4 ACL in the Association pane, you can choose to apply the ACL to the interface or to go to the IPv4 ACLs feature and configure the ACL.
Figure 14-2 Association Pane
Association pane
14-4
OL-25174-02OL-25174-02
Chapter 14
Using the Cisco DCNM-LAN Client Information About the DCNM-LAN Client
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Menus
The menu bar in the DCNM-LAN client includes the following standard menus that appear:
File Menu
NewAllows you to create new objects. The types of objects that you can create depends upon the currently selected feature. In some cases, the object selected in the Summary pane also affects what you can create. DeploySaves your changes to the DCNM-LAN server and deploys configuration changes to managed devices. ExitCloses the DCNM-LAN client.
View Menu
ToolbarsAllows you to show or hide the toolbars that are available for the currently selected feature. For more information, see the Toolbars section on page 14-6. RefreshForces the DCNM-LAN client to retrieve updated information from the DCNM-LAN server. FilterEnables or disables the filtering option for the Summary pane.
Tools Menu
PreferencesOpens the Global Preferences dialog box. For more information, see the Configuring Global Preferences section on page 14-15. DebugOpens the DCNM-LAN Client Logging dialog box, which allows you to configure the logging level for the DCNM-LAN client.
Note
We recommend that you use the default client logging level unless you are troubleshooting a specific problem or are asked to change client logging levels by the Cisco technical support staff.
Go Menu
TopologySelects the Topology button on the Feature Selector pane. InventorySelects the Inventory button on the Feature Selector pane. Virtual DevicesSelects the Virtual Devices button on the Feature Selector pane. InterfacesSelects the Interfaces button on the Feature Selector pane. SwitchingSelects the Switching button on the Feature Selector pane. FCoESelects the FCoE button on the Feature Selector pane. RoutingSelects the Routing button on the Feature Selector pane. SecuritySelects the Security button on the Feature Selector pane. Configuration Change ManagementSelects the Configuration Change Management button on the Feature Selector pane. Device OS ManagementSelects the Device OS Management button on the Feature Selector pane.
14-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Configuration Delivery ManagementSelects the Configuration Delivery Management button on the Feature Selector pane. DCNM-LAN Server AdministrationSelects the DCNM-LAN Server Administration button on the Feature Selector pane. Network ServersSelects the Network Servers button on the Feature Selector pane. Event BrowserSelects the Event Browser button on the Feature Selector pane.
Actions Menu
The items on the Actions menu reflect what you can do, depending upon the feature you are using and the object that is selected in the Summary pane. For some features, such as Inventory, the Actions menu does not appear in the menu bar.
Help Menu
Help ContentsOpens the online help system to the Welcome page. Context HelpOpens the online help system to a page that applies to the feature currently selected in the Feature Selector pane. Show DCNM-LAN Instance IDOpens a dialog box that displays the license ID for your DCNM-LAN server. For more information, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. View LicensesOpens a dialog box that displays information about license files currently installed with your DCNM-LAN server. About Data Center Network ManagerOpens a dialog box that displays information about your DCNM-LAN server, including the software version and implementation version.
Toolbars
The DCNM-LAN client provides several standard toolbars plus additional, feature-specific toolbars that are available only when you have selected the applicable feature. The following table lists actions that you can take to configure toolbars. Action Show or hide a toolbar Rearrange toolbars Float a toolbar Control whether a toolbar can be hidden, rearranged, or floated How To Right-click on the toolbar area and then choose the toolbar that you want to show or hide. On a toolbar that you want to move, click on the left end of the toolbar and drag it to where you want it. On the toolbar that you want to float, click on the left end of the toolbar and drag it off of the toolbar area. Right-click on the toolbar area and then choose the option that you want to control.
14-6
OL-25174-02OL-25174-02
Chapter 14
Using the Cisco DCNM-LAN Client Information About the DCNM-LAN Client
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Keyboard Commands
You can use the keyboard to perform many of the commands that you can perform with menu items or toolbars. The menus show the keyboard equivalent of most menu items. For example, the following list shows some common menu items and the matching keyboard command:
Unsupported FeaturesIf a platform does not support a particular feature, the platform is not displayed for that feature. For example, if you choose Security > Access Control > Time-range from the Feature Selector pane, the Summary pane displays only the platform types that support the Time-range feature. In this case, the Cisco Nexus 1000V does not support this feature, so any managed Cisco Nexus 1000V platforms are not displayed in the Summary pane. Similarly, the Time-range association pane does not include any Cisco Nexus 1000V platforms.
Unsupported AttributesSometimes a platform supports a feature, but does not support a particular attribute in that feature. In this case, the attribute is grayed-out or a N/A (Not Applicable) value is displayed in the field or cell. If all attributes grouped in a particular section are not supported, N/A is added to the section title, and DCNM-LAN does not allow you to expand the section. If all attributes in a tab are not supported for a particular platform, the tab is displayed, but if you click on it, a message appears stating that the attribute is not supported.
Unsupported ChartsIf a platform does not support some attributes in a chart, DCNM-LAN grays out those attributes. If a platform does not support any attributes in a chart, when you select the chart, DCNM-LAN displays a message stating that the chart is not supported. Unsupported OptionsIf a platform does not support an option, the option is not displayed, for example, in drop-down lists. Unsupported Operations If a platform does not support an option for a specific operation on a context or toolbar menu, the option is grayed-out.
14-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the start menu, choose All Programs > Cisco DCNM Client > Cisco DCNM LAN.
Note
If the DCNM-LAN client is not available on the All Programs menu, you can launch the DCNM-LAN client from the DCNM-LAN server website. For more information, see Chapter 13, Installing and Launching the Cisco DCNM-LAN Client.
In the DCNM Server field, enter the IP address or hostname of the DCNM-LAN server. You can use the hostname only if your DNS server has an entry for the DCNM-LAN server hostname. If you have previously logged into the server with the current client installation, you may be able to choose the IP address or hostname from the drop-down list.
Note
If your DCNM-LAN deployment uses a clustered-server environment, enter the DNS name or IP address of the master DCNM-LAN server.
In the Username field, enter the name of the DCNM-LAN server user account that you want to use to access the DCNM-LAN client. In the Password field, enter the password for the user account that you specified. (Optional) If you need to change the DCNM-LAN server port, do the following:
a. b.
If the Port field is not visible, click More >>. Enter the port number in the Port field. The default DCNM-LAN server port number is 1099; however, you can specify a different port number when you install or reinstall the DCNM-LAN server.
Step 6
(Optional) If you need to use a proxy server to connect to the DCNM-LAN server, do the following:
a. b.
If the Connect to the DCNM-LAN server with a proxy server check box is not visible, click More >>. Check Connect to the DCNM server with a proxy server. The Proxy Server area appears below the check box. In the Address field, enter the IP address of the proxy server. In the HTTP Port and Socks Port fields, enter the port numbers on which the proxy server accepts HTTP and Socks connections.
c. d.
14-8
OL-25174-02OL-25174-02
Chapter 14
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
e. Step 7
(Optional) If the proxy server requires authentication, check Authentication and enter a valid username and password in the fields provided.
Click Login. The DCNM-LAN client user interface appears. If a dialog box displays a message about device credentials, you have not configured device credentials for the user account that you specified.
Step 8
If a dialog box shows a message that your device credentials are not set, do one of the following:
If you want to set device credentials now, click Yes. If you do not want to set device credentials now, click No.
Note
For information about setting device credentials, see the Administering Devices and Credentials section on page 17-1.
DETAILED STEPS
Step 1
From the menu bar, choose File > Exit. A dialog box displays a confirmation message. (Optional) If you have not deployed your changes, do one of the following:
Step 2
If you want to save your changes, including deploying configuration changes to managed devices, check Save pending changes. If you want to discard your changes, uncheck Save pending changes.
Step 3
Click Yes. If you started any statistical data collection processes during the DCNM-LAN client session, a dialog box displays the collection processes.
Step 4
If a dialog box displays the statistical data collection processes that you started, do the following:
a.
Note
We recommend that you stop any unnecessary statistical collection processes when you log out of the DCNM-LAN client.
b. c.
Check the collection processes that you want to stop. If you want to stop all of your collection processes, click Select All. Click Ok.
14-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Deploying Changes
When you use the DCNM-LAN client to make configuration changes to managed devices or to the DCNM-LAN server, you may need to deploy the changes or the DCNM-LAN client may deploy them automatically, depending upon what changes you have made.
Automatic deploymentIf the DCNM-LAN client deploys a change automatically, the Deploying configuration message appears briefly. For example, if you delete an access rule from an ACL, the DCNM-LAN client immediately deploys this configuration change to the managed device that has the ACL. Manual deploymentIf the DCNM-LAN client is storing a configuration change, on the toolbar, the Deploy button is available. For example, if you change the sequence number of an access rule of an ACL, the DCNM-LAN client stores this configuration change until you manually deploy it to the managed device that has the ACL. To remind you of the necessity to deploy changes that the DCNM-LAN client is storing, the procedures in the DCNM-LAN documentation set include a deployment step.
Deploying server changes saves your changes on the DCNM-LAN server. For example, if you add a DCNM-LAN server user account, deploying your changes adds the user account to the DCNM-LAN server and does not affect managed devices. Deploying configuration changes to a managed device causes the DCNM-LAN server to update the running configuration of the device.
Note
DCNM-LAN does not update the startup configuration of a managed device. When you want to replace the startup configuration of a managed device with the running configuration, you can log into the command-line interface of the device and copy the running configuration to the startup configuration. When you close the DCNM-LAN client and you have not deployed your changes, you can deploy them without canceling the process of closing the DCNM-LAN client. For more information, see the Closing the DCNM-LAN Client section on page 14-9.
Information about Statistics and Charts, page 14-11 Licensing Requirements for Statistics and Charts, page 14-11 Accessing a Chart, page 14-11 Starting Statistical Monitoring for a Chart, page 14-12 Stopping Statistical Monitoring for a Chart, page 14-12 Using a Chart, page 14-13 Using an Overview Chart, page 14-14 Exporting a Chart, page 14-15
14-10
OL-25174-02OL-25174-02
Chapter 14
Using the Cisco DCNM-LAN Client Working with Statistics and Charts
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
For information about obtaining and installing a Cisco DCNM-LAN LAN Enterprise license, see the Cisco DCNM Installation and Licensing Guide, Release 5.x.
Accessing a Chart
You can access any chart. The charts that are available for a particular Statistics tab depend upon the feature and object selected.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose the feature for which you want to use a statistical chart. For example, choose Interfaces > Physical > Ethernet. From the Summary pane, select an object. The Statistics tab appears in the Details pane.
Step 2
Note
If no Statistics tab appears, DCNM-LAN does not provide a statistical chart for the object that you selected.
Step 3
Click the Statistics tab. In the Statistics tab, one or more charts may appear.
14-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
A dialog box may appear to confirm if you want to view charts for statistical collections that DCNM-LAN is running for the object that you selected in the Summary pane. For more information, see the Configuring Monitoring Preferences section on page 14-16.
Step 4 Step 5
If the chart for the data that you want to monitor does not appear, from the toolbar, choose New Chart and then choose the chart that you want. Click the title bar of the chart that you want to work with. The chart status appears in the lower left corner of the chart pane. If the chart is not active, you must start statistical monitoring for the chart before you can use it. For more information, see the Starting Statistical Monitoring for a Chart section on page 14-12.
Note
Each time that you start monitoring for a new chart, DCNM-LAN creates a new statistical collection process that appears in the Statistical Data Collection feature.
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4
Access the chart for which you want to start statistical monitoring. For more information, see the Accessing a Chart section on page 14-11. From the chart pane, click Select Parameters, check at least one statistical parameter that you want to appear in the chart, and click Select Parameters again. From the Monitor toolbar, choose the icon to start the collection process. The chart starts graphing the selected parameters.
Note
When you close the DCNM-LAN client without stopping the statistical collection processes that you started, a dialog box prompts you to decide whether to stop the statistical collections or let them continue. We recommend that you stop any unnecessary statistical collection processes when you log out of the DCNM-LAN client.
Note
When you stop monitoring for a chart, DCNM-LAN stops the corresponding statistical collection process that appears in the Statistical Data Collection feature.
14-12
OL-25174-02OL-25174-02
Chapter 14
Using the Cisco DCNM-LAN Client Working with Statistics and Charts
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1 Step 2
Access the chart for which you want to stop statistical monitoring. For more information, see the Accessing a Chart section on page 14-11. From the Monitor toolbar choose the icon.
Note
If the chart that you want to stop does not appear, use the Statistical Data Collection feature to stop the collection process. For more information, see the Starting Statistical Monitoring for a Chart section on page 14-12.
Using a Chart
The DCNM-LAN client provides the following options for using a chart:
Changing parameters Setting the charting frequency Controlling the magnification of the chart data Showing, moving, and hiding threshold lines Tearing the chart away from the DCNM-LAN client window
This procedure provides basic instructions for using each of these options.
Note
For information about using an overview chart, see the Using an Overview Chart section on page 14-14.
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4 Step 5
Access the chart that you want to use. For more information, see the Accessing a Chart section on page 14-11. If the chart is not active, you must start statistical monitoring for the chart before you can use it. For more information, see the Starting Statistical Monitoring for a Chart section on page 14-12. (Optional) To change parameters, click Select Parameters, check the statistics parameters that you want to collect, and click Select Parameters again. (Optional) To set the frequency with which DCNM-LAN retrieves statistical data for the selected object, from the Select Frequency drop-down list on the Monitor toolbar, choose the new frequency. (Optional) To control the magnification, or zoom, of the chart, do one of the following:
To zoom in on a portion of the chart, position the mouse pointer at one end of the portion, click and hold the left mouse button, drag the mouse pointer to the other end of the portion, and release the mouse button. To zoom in on a portion of the chart, position the mouse pointer at one end of the portion and then click and drag the mouse pointer to the other end of the portion. To change to the previous zoom, click the icon.
14-13
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 6
To show or hide threshold lines, on the Monitor toolbar, click the To move the lower threshold line, click and drag the To move the lower threshold line, click and drag the icon. icon.
Step 7
(Optional) To tear the chart away from the DCNM-LAN client window, click on the red line that appears below the chart title.
DETAILED STEPS
Step 1 Step 2
Access the chart that contains the overview chart that you want to use. For more information, see the Accessing a Chart section on page 14-11. If the chart is not active, you must start statistical monitoring for the chart before you can use its overview chart. For more information, see the Starting Statistical Monitoring for a Chart section on page 14-12. Click Show Overview Chart. In a new window, the overview chart displays the historical trends of the charted data. To set the time scale of the chart, at the bottom of the overview chart window, click the desired time scale button. The time scale buttons are as follows:
Step 3
Step 4
RTReal time 1dOne day 2dTwo days 5dFive days 15dFifteen days 1mOne month 3mThree months
Step 5
14-14
OL-25174-02OL-25174-02
Chapter 14
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Exporting a Chart
You can export a chart as a JPG image or as a comma-separated value (CSV) file. When you export a chart as a JPG image, the image is of the chart as it appears when you export the image. When you export a chart as a CSV file, the file contains all data from the statistical collection for the chart.
DETAILED STEPS
Step 1 Step 2
Access the chart that you want to use. For more information, see the Accessing a Chart section on page 14-11. If the chart is not active, you must start statistical monitoring for the chart before you can export an image of it. For more information, see the Starting Statistical Monitoring for a Chart section on page 14-12. If you want to export an image, configure the chart to show the data that you want to appear in the image. For more information, see the Using a Chart section on page 14-13. Right-click on the chart. Choose one of the following:
Step 6
Specify the location and filename, and then click Save. The DCNM-LAN client exports the chart in the file format that you specified.
MonitoringControls the default frequency of statistical data retrieval from managed devices and whether statistical charts open automatically. For more information, see the Configuring Monitoring Preferences section on page 14-16. EventsControls the maximum age of events that the DCNM-LAN client fetches from the DCNM-LAN server when you start the DCNM-LAN client. For more information, see the Configuring the Maximum Age of Events Fetched from the Server section on page 14-16. Pre ProvisionControls whether the DCNM-LAN client displays some settings only when other settings are made or whether the DCNM-LAN client always displays all settings. For more information, see the Configuring Preprovisioning section on page 14-17.
14-15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the menu bar, choose Tools > Preferences. The Global Preferences dialog box appears. Under Monitoring, the Default Monitoring Frequency drop-down list displays the current frequency for statistical data retrieval. The default polling frequency is 30 seconds. If you want to configure the default frequency of statistical data retrieval, from the Default Monitoring Frequency drop-down list, choose the new data retrieval frequency. If you want to configure the default behavior when you access the Statistics tab of an object for which DCNM-LAN is already collecting statistical data, do one of the following:
Step 2 Step 3
If you want the client to show charts without asking for confirmation, check the Load history charts by default check box. If you want the client to prompt you for confirmation before it opens statistical charts, uncheck the Load history charts by default check box.
Step 4
Click Ok.
DETAILED STEPS
Step 1
From the menu bar, choose Tools > Preferences. The Global Preferences dialog box appears. Under Events, the Fetch events before drop-down list displays the current maximum age of events.
14-16
OL-25174-02OL-25174-02
Chapter 14
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
From the Fetch events before drop-down list, choose the new maximum age of events.
Note
To prevent the DCNM-LAN client from fetching any old events, choose zero (0) hours as the maximum age of events. When you choose zero hours, the DCNM-LAN client shows only the events that the DCNM-LAN server receives after you start the DCNM-LAN client.
Step 3
Click Ok.
Configuring Preprovisioning
Preprovisioning refers to configuring a managed device with settings for modes or protocols that are not enabled. The preprovisioning preference affects the following sections of the DCNM-LAN client interface:
Interfaces > Physical > Ethernet > Device > Slot > Interface, Port Details tab, Port Mode Settings section When you enable preprovisioning, the DCNM-LAN client displays all port mode fields regardless of the setting in the Mode drop-down list. When you disable preprovisioning, the DCNM-LAN client displays only the port mode settings that are relevant to the currently selected port mode. For example, if preprovisioning is disabled and you choose Trunk from the Mode drop-down list, the DCNM-LAN client displays only the Trunk settings and hides the Access, PVLAN Host, and PVLAN Promiscuous fields. Additionally, the dialog boxes for configuring the Access VLAN field and the Native VLAN field include the Create in the Device check box. When you enable preprovisioning, you can uncheck this check box if you want DCNM-LAN to configure the device to refer to a VLAN that is not currently configured. When you disable preprovisioning, this check box is always checked and DCNM-LAN creates the VLAN specified, if it does not already exist.
Switching > Spanning Tree > Device, Configuration tab, Global Settings section When you enable preprovisioning, the DCNM-LAN client displays MST settings regardless of the settings in the Protocol drop-down list. When you disable preprovisioning, the DCNM-LAN client displays the MST Setting fields unless you choose MST from the Protocol drop-down list.
DETAILED STEPS
Step 1
From the menu bar, choose Tools > Preferences. The Global Preferences dialog box appears. Under Pre Provision, the Pre Provision check box appears. Do one of the following:
Step 2
If you want to enable preprovisioning, ensure that the Pre Provision check box is checked. If you want to disable preprovisioning, ensure that the Pre Provision check box is unchecked.
Step 3
Click Ok.
14-17
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
ContentsThe organization of DCNM-LAN online help is shown in the Contents tab of the online help window. When a topic has subtopics, the book icon appears to the left of the topic in the contents. You can expand and collapse individual topics in the contents. You can also collapse or expand all topics.
IndexDCNM-LAN online help includes an index, which allows you to look up subjects alphabetically and open related topics directly from the index. FavoritesDCNM-LAN online help allows you to add specific topics to the Favorites tab. Favorites are stored locally on the computer that you use to access online help.
To access the welcome page in online help, from the menu bar, choose Help > Help Contents. DCNM-LAN online help includes context-sensitive help. To access context-sensitive help for a feature, follow these steps:
Step 1 Step 2
Select a specific feature from the Feature Selector pane in the DCNM-LAN client. For example, choose Security > Access Control > IPv4 ACL. Do one of the following:
Press F1. From the toolbar, click the question mark icon.
Online help for the selected feature appears in a browser window. DCNM-LAN uses the default browser application on the computer that runs the DCNM-LAN client.
Additional References
For additional information related to using the DCNM-LAN client, see the following sections:
Related Documents
Related Topic Installing and launching the DCNM-LAN client Document Title Chapter 13, Installing and Launching the Cisco DCNM-LAN Client
Information about using specific DCNM-LAN features Obtaining Documentation and Submitting a Service Request, page lxviii
14-18
OL-25174-02OL-25174-02
Chapter 14
Using the Cisco DCNM-LAN Client Feature History for Using the DCNM-LAN Client
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Feature Information Support was added for the Load history charts by default check box. Information was added about how the DCNM-LAN client supports management of different Cisco NX-OS device types.
14-19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
14-20
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
15
Information About Administering DCNM-LAN Authentication Settings, page 15-1 Licensing Requirements for Administering DCNM-LAN Authentication Settings, page 15-4 Prerequisites for Administering DCNM-LAN Authentication Settings, page 15-4 Guidelines and Limitations for Administering DCNM-LAN Authentication Settings, page 15-5 Configuring DCNM-LAN Authentication Settings, page 15-5 Viewing DCNM-LAN Local Users, page 15-12 Verifying Authentication Server Settings, page 15-12 Field Descriptions for DCNM-LAN Authentication Settings, page 15-13 Additional References, page 15-14 Feature History for DCNM-LAN Authentication Settings, page 15-15
Users and User Roles, page 15-2 Local Authentication and DCNM-LAN Local Users, page 15-2 RADIUS and TACACS+ Authentication, page 15-2 User Role Assignment by RADIUS and TACACS+, page 15-3 Fallback to Local Authentication, page 15-3 Password Recovery, page 15-3
15-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Users and Device Credentials, page 15-4 Virtualization Support, page 15-4
Description
Cannot change DCNM-LAN authentication mode Cannot add or delete DCNM-LAN local user accounts Can change the details of its own local user account Can use all other features Has full control of DCNM-LAN authentication settings Can use all other features
Administrator
Note
DCNM-LAN server users are local to the DCNM-LAN server. Creating, changing, and removing DCNM-LAN server users has no effect on user accounts on managed devices. A DCNM-LAN server uses local users to grant access in the following cases:
When the authentication mode is local When no authentication server for the current authentication mode is reachable.
You can use local authentication as the primary authentication mode. If you specify RADIUS or TACACS+ as the primary authentication mode, the DCNM-LAN server always falls back to local authentication if no authentication server for the current authentication mode is reachable.
15-2
OL-25174-02OL-25174-02
Chapter 15
Administering DCNM-LAN Authentication Settings Information About Administering DCNM-LAN Authentication Settings
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DCNM-LAN supports primary, secondary, and tertiary authentication servers for RADIUS and TACACS+. Only a primary server is required. For each authentication server, you can specify the port number that the server listens to for authentication requests. During authentication, if the primary server for the current authentication mode does not respond to the authentication request, the DCNM-LAN server sends the authentication request to the secondary server. If the secondary server does not respond, DCNM-LAN sends the authentication request to the tertiary server. If none of the servers configured for the current authentication mode responds to an authentication request, the DCNM-LAN server falls back to local authentication.
Password Recovery
If no one can log into the DCNM-LAN client as a user with a DCNM-LAN Administrator role, you can reset passwords by using one of the following scripts:
15-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
For Microsoft Windows, use dcnm_root_directory/dcm/dcnm/bin/pwreset.bat (by default, dcnm_root_directory is c:\Program Files\Cisco Systems\dcm\dcnm\bin). For Linux, use dcnm_root_directory/dcm/dcnm/bin/pwreset.sh (by default, the dcnm_root_directory is /usr/local/cisco).
To reset a password, run the script for the operating system that you are using, and then enter the user ID to be reset and the password to be used for it. Alternatively, you can reinstall the DCNM-LAN server, which allows you to specify the username and password for a local user account that is assigned the Administrator role. For more information, see the Cisco DCNM Installation and Licensing Guide, Release 5.x.
Virtualization Support
Cisco NX-OS support for virtual device contexts has no effect on DCNM-LAN server users. DCNM-LAN server users can configure any managed device.
You must ensure that every authentication server that you want to use with DCNM-LAN is configured to accept authentication requests from the DCNM-LAN server. If you have deployed DCNM-LAN in a clustered-server environment, ensure that every authentication server is configured to accept requests from each DCNM-LAN server in the cluster.
15-4
OL-25174-02OL-25174-02
Chapter 15
Administering DCNM-LAN Authentication Settings Guidelines and Limitations for Administering DCNM-LAN Authentication Settings
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
To add, delete, or modify DCNM-LAN local users, you must be logged into the DCNM-LAN client with a user account that is assigned the Administrator DCNM-LAN role.
Create a DCNM-LAN user account for each person who uses the DCNM-LAN client. Do not allow people to share a user account. Delete unused DCNM-LAN user accounts. Grant an administrator user account only to those who need to perform administrator tasks in the DCNM-LAN client. We recommend that you use strong passwords. Common guidelines for strong passwords include a minimum password length of eight characters and at least one letter, one number, and one symbol. For example, the password Re1Ax@h0m3 has ten characters and contains uppercase and lowercase letters in addition to one symbol and three numbers.
Configuring the Authentication Mode, page 15-5 Adding a DCNM-LAN Local User, page 15-6 Changing the Password of a DCNM-LAN Local User, page 15-7 Changing the Full Name, Role, or Description of a DCNM-LAN Local User, page 15-8 Deleting a DCNM-LAN Server User, page 15-8 Adding Authentication Servers, page 15-9 Changing Authentication Server Settings, page 15-10 Removing an Authentication Server, page 15-11
15-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1 Step 2 Step 3 Step 4 Step 5
From the Feature Selector pane, choose DCNM Server Administration > DCNM Authentication Settings. If necessary, expand the Authentication Mode section. Choose the authentication mode. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server. Restart the DCNM-LAN server. For more information, see the Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers.
Note
Adding a DCNM-LAN local user account does not affect the user account configuration on any Cisco NX-OS device.
Note
We recommend that you use a strong password. Common guidelines for strong passwords include a minimum password length of eight characters and at least one letter, one number, and one symbol. For example, the password Re1Ax@h0m3 has ten characters and contains uppercase and lowercase letters in addition to one symbol and three numbers.
DETAILED STEPS
Step 1 Step 2
From the Feature Selector pane, choose DCNM Server Administration > DCNM Authentication Settings. If necessary, expand the DCNM Local Users section. A table of users appears in the Cisco DCNM Local Users section. From the menu bar, choose Actions > Add User. A new row appears at the bottom of the list of users. By default, all fields in the new row are blank. In the DCNM User Name column of the new row, enter the username. The username can be 1 to 198 characters. Entries can contain case-sensitive letters, numbers, and symbols. (Optional) In the Full Name column, double-click the entry and add a name. For example, enter the real name of the person who will use the DCNM-LAN local user account. The maximum length is 255 case-sensitive letters, numbers, and symbols. In the DCNM Role column, double-click the entry and choose the role. By default, the role is User.
Step 3
Step 4 Step 5
Step 6
15-6
OL-25174-02OL-25174-02
Chapter 15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 7 Step 8 Step 9 Step 10
In the Password column, double-click the entry and then click the down-arrow button. In the New Password field and the Confirm Password field, enter the password. The password can be 1 to 255 characters. Entries can contain case-sensitive letters, numbers, and symbols. Click OK. (Optional) In the Description column, double-click the entry and add a description of the user account. For example, you could use this entry to provide e-mail and telephone contact details of the person who will be using this DCNM-LAN server user account. The maximum length is 255 case-sensitive letters, numbers, and symbols. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Step 11
Note
We recommend that you use a strong password. Common guidelines for strong passwords include a minimum password length of eight characters and at least one letter, one number, and one symbol. For example, the password Re1Ax@h0m3 has ten characters and contains uppercase and lowercase letters in addition to one symbol and three numbers.
DETAILED STEPS
Step 1 Step 2
From the Feature Selector pane, choose DCNM Server Administration > DCNM Server Authentication Settings. If necessary, expand the DCNM Local Users section. A table of users appears in the DCNM Local Users section. In the User Name column, click the username for the user account that you want to change. The row of the username that you clicked is highlighted. In the Password column, double-click the entry and then click the down-arrow button. In the New Password field and the Confirm Password field, enter the new password. The password can be 1 to 255 characters. Entries can contain case-sensitive letters, numbers, and symbols. Click OK. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Step 3
15-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
You cannot change the username. Instead, add a local user account with the desired username and remove the local user account with the unwanted username.
DETAILED STEPS
Step 1 Step 2
From the Feature Selector pane, choose DCNM Server Administration > DCNM Authentication Settings. If necessary, expand the DCNM Local Users section. A table of users appears in the Cisco DCNM Local Users section. In the User Name column, click the username of the local user account that you want to change. The row of the username that you clicked is highlighted. (Optional) In the Full Name column, double-click the entry and enter the new name. The maximum length is 255 case-sensitive letters, numbers, and symbols. (Optional) In the DCNM Role column, double-click the entry and choose the new role. You can choose Administrator or User. (Optional) In the Description column, double-click the entry and enter the new description of the user account. The maximum length is 255 case-sensitive letters, numbers, and symbols. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Step 3
15-8
OL-25174-02OL-25174-02
Chapter 15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1 Step 2
From the Feature Selector pane, choose DCNM Server Administration > DCNM Authentication Settings. If necessary, expand the DCNM Local Users section. A table of users appears in the DCNM Local Users section. In the User Name column, click the username of the user account that you want to remove. The row of the username that you clicked is highlighted. From the menu bar, choose Actions > Delete User. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Step 3
Step 4 Step 5
Note
You must ensure that every authentication server that you want to use with DCNM-LAN is configured to accept authentication requests from the DCNM-LAN server. If you have deployed DCNM-LAN in a clustered-server environment, ensure that every authentication server is configured to accept requests from each DCNM-LAN server in the cluster. Ensure that you have the following information about each authentication server that you want to add:
AAA protocol: RADIUS or TACACS+ Server IPv4 address or DNS name that can be resolved by the DCNM-LAN server. Secret key. Port number on which the server accepts authentication requests. (RADIUS only) Port number on which the server accepts accounting messages. Authentication protocol: PAP, CHAP, MSCHAP, or ASCII. (Optional) Username and password of a valid user account on the server for server verification.
Determine whether the server should be a primary, secondary, or tertiary server, which depends upon your authentication server failover strategy.
DETAILED STEPS
Step 1 Step 2
From the Feature Selector pane, choose DCNM Server Administration > DCNM Authentication Settings. If necessary, expand the Authentication Servers section. The Authentication Server Settings table shows RADIUS and TACACS+ server settings. If necessary, expand the RADIUS or TACACS+ server rows.
Step 3
15-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 4
For each authentication server that you want to add, follow these steps:
a.
Note
The DCNM-LAN client does not allow you to add a secondary server if you have not added a primary server. In addition, you cannot add a tertiary server if you have not added a secondary server.
b.
Double-click the Server Name field and enter the server IPv4 address or DNS hostname.
Note
If you enter a hostname that the DCNM-LAN server cannot resolve, the Server Name field is highlighted in red.
c. d. e. Step 5
Double-click the Secret Key field and enter the secret key (sometimes called a shared secret) of the authentication server. (Optional) If you need to change the default Authentication Port or Accounting Port (RADIUS only), double-click the applicable port field and enter the new port number. Double-click the Authentication Method field and choose the authentication protocol that DCNM-LAN must use when sending authentication requests to the authentication server.
(Optional) If you want to verify that the DCNM-LAN server can authenticate a user with a new authentication server, follow these steps:
a.
To the right of the row for the authentication server that you want to verify, click Verify. A Verification dialog box appears. Enter a username and password for a valid user account on the authentication server. Click Verify.
b. c.
The DCNM-LAN client displays a message indicating whether the verification attempt succeeded or failed. A verification failure may mean that the authentication server is unavailable or that the authentication settings are incorrect.
Step 6
From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
DETAILED STEPS
Step 1 Step 2
From the Feature Selector pane, choose DCNM Server Administration > DCNM Authentication Settings. If necessary, expand the Authentication Servers section. The Authentication Server Settings table shows RADIUS and TACACS+ server settings. If necessary, expand the RADIUS or TACACS+ server rows.
Step 3
15-10
OL-25174-02OL-25174-02
Chapter 15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 4 Step 5 Step 6
(Optional) If you want to change the settings of an authentication server, double-click each field that you need to change and enter the changes. (Optional) If you want to reorder RADIUS or TACACS+ servers, right-click a server and choose Move Up or Move Down, as needed. (Optional) If you want to verify that the DCNM-LAN server can authenticate a user with an authentication server, follow these steps:
a.
To the right of the row for the authentication server that you want to verify, click Verify. A Verification dialog box appears. Enter a username and password for a valid user account on the authentication server. Click Verify.
b. c.
The DCNM-LAN client displays a message indicating whether the verification attempt succeeded or failed. A verification failure may mean that the authentication server is unavailable or that the authentication settings are incorrect.
Step 7
From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
DETAILED STEPS
Step 1 Step 2
From the Feature Selector pane, choose DCNM Server Administration > DCNM Authentication Settings. If necessary, expand the Authentication Servers section. The Authentication Server Settings table shows RADIUS and TACACS+ server settings. If necessary, expand the RADIUS or TACACS+ server rows. Right-click the authentication server that you want to remove and choose Remove Server. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
15-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1 Step 2
From the Feature Selector pane, choose DCNM Server Administration > DCNM Authentication Settings. If necessary, expand the Authentication Servers section. The Authentication Server Settings table shows RADIUS and TACACS+ server settings. Click Verify. A Verification dialog box appears. Enter a username and password for a valid user account on the authentication server. To the right of the row for the authentication server that you want to verify, click Verify. The DCNM-LAN client displays a message indicating whether the verification attempt succeeded or failed. A verification failure may mean that the authentication server is unavailable or that the authentication settings are incorrect.
Step 3
Step 4 Step 5
15-12
OL-25174-02OL-25174-02
Chapter 15
Administering DCNM-LAN Authentication Settings Field Descriptions for DCNM-LAN Authentication Settings
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Authentication Mode Section, page 15-13 DCNM-LAN Local Users Section, page 15-13 Authentication Servers Section, page 15-14
Description Whether DCNM-LAN authenticates users with the local user database only. Whether DCNM-LAN authenticates users with a RADIUS server. When no configured RADIUS server is reachable, DCNM-LAN falls back to using the local database for user authentication. Whether DCNM-LAN authenticates users with a TACACS+ server. When no configured TACACS+ server is reachable, DCNM-LAN falls back to using the local database for user authentication.
TACACS+
Description Display only. Name of the DCNM-LAN server user account. This name can be used to log into the DCNM-LAN client when the authentication mode is local or when no authentication server for the current authentication mode is reachable. Entries are case sensitive. Valid characters are all letters, numbers, and symbols. The minimum length is 1 character. The maximum length is 198 characters. Other name for the user account, such as the name of the person who uses the DCNM-LAN server user account. This name cannot be used to log into the DCNM-LAN client. Valid characters are all letters, numbers, and symbols. The maximum length is 255 characters. This field is blank by default. Role of the user account. Valid values are User and Administrator. For more information, see Table 15-1. By default, a DCNM-LAN server user account is assigned the role of User. Password for the DCNM-LAN server user. This field is always masked for security. Entries are case sensitive. Valid characters are all letters, numbers, and symbols. The minimum length is 1 character. The maximum length is 255 characters.
Full Name
DCNM-LAN Role
Password
15-13
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 15-4 DCNM-LAN Local Users Section (continued)
Field Description
Description Description of the DCNM-LAN server user. Valid characters are all letters, numbers, and symbols. The maximum length is 255 characters. This field is blank by default.
DNS nameIf you specify a DNS name, the DCNM-LAN server must be able to resolve the IP address of the server. Valid DNS names characters are alphanumeric. IPv4 addressIf you specify an IP address, valid entries are in dotted decimal format.
Shared secret of the authentication server. Valid entries are case-sensitive letters, numbers, and symbols. TCP or UDP port number that the authentication server listens to for authentication requests. By default, the authentication port for a RADIUS server is UDP port 1812 and the authentication port for a TACACS+ server is TCP port 49. UDP port number that the RADIUS authentication server listens to for authentication requests. By default, the accounting port for a RADIUS server is UDP port 1813. Authentication protocol that the DCNM-LAN server uses in authentication requests to the authentication server. Supported authentication methods are as follows:
Accounting Port
Authentication Method
Additional References
For additional information related to administering DCNM-LAN authentication settings, see the following sections:
15-14
OL-25174-02OL-25174-02
Chapter 15
Administering DCNM-LAN Authentication Settings Feature History for DCNM-LAN Authentication Settings
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Related Documents
Related Topic Logging into the DCNM-LAN client Document Title Opening the DCNM-LAN Client, page 14-8
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Releases 5.0(2)
15-15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
15-16
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
16
Information About Device Discovery, page 16-1 Licensing Requirements for Device Discovery, page 16-6 Prerequisites for Device Discovery, page 16-7 Guidelines and Limitations for Device Discovery, page 16-7 Performing Device Discovery, page 16-8 Viewing the Status of Device Discovery Tasks, page 16-12 Where to Go Next, page 16-12 Field Descriptions for Device Discovery, page 16-13 Device System-Message Logging Level Reference, page 16-14 Additional References for Device Discovery, page 16-18 Feature History for Device Discovery, page 16-19
Device Discovery, page 16-2 Discovery Protocols, page 16-2 Credentials and Discovery, page 16-3 Discovery Process, page 16-3 Cisco NX-OS System-Message Logging Requirements, page 16-4 Automatic Logging-Level Configuration Support, page 16-5 VDC Support, page 16-5
16-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Device Discovery
The Device Discovery feature creates devices in DCNM-LAN by connecting to a Cisco NX-OS device and retrieving data from the device, including its running configuration. DCNM-LAN can also discover Cisco NX-OS devices and network servers that are neighbors of the first device, which is known as the seed device.
Note
Staring from Cisco NX-OS Release 5.2.2(a) the Cisco DCNM-LAN supports the discovery of the following modules:
N7K-F248XP-25 Line Card N55-M16FP 16-Port FC GEM N7K-C7010-FAB2 Fabric 2 module N7K-C7018-FAB2 Fabric 2 module N55-D160L3-V2 Daughter Card N55-M160L3-V2 Line Card N3K-C3048TP-1GE Layer 3 switch N3K-C3016Q- 40GE Layer 3 switch
If the device supports virtual device contexts (VDCs), DCNM-LAN retrieves the running configuration of each VDC that is configured on the physical device. DCNM-LAN displays each VDC as a device, including the default VDC. If the Cisco NX-OS device has only the default VDC, then device discovery creates only one device in DCNM-LAN. When DCNM-LAN connects to a device to retrieve its configuration, it uses the XML management interface, which uses the XML-based Network Configuration Protocol (NETCONF) over Secure Shell (SSH). For more information, see the Cisco NX-OS XML Interface User Guide.
Discovery Protocols
DCNM-LAN uses a variety of protocols to discover devices and servers in your data center network. This section includes the following topics:
Cisco Discovery Protocol, page 16-2 Link Layer Discovery Protocol, page 16-3 Fibre Channel, page 16-3
16-2
OL-25174-02OL-25174-02
Chapter 16
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
After DCNM-LAN discovers a Cisco NX-OS device using CDP, it connects to the device and retrieves information, such as the running configuration of the device. The information collected allows DCNM-LAN to manage the device. DCNM-LAN supports CDP hops on some Cisco switches that run Cisco IOS software. Although DCNM-LAN cannot manage these devices, the Topology feature allows you to see unmanaged devices and the CDP links between unmanaged devices and managed devices.
Fibre Channel
To discover network elements in a storage area network (SAN), DCNM-LAN uses Fibre Channel. DCNM-LAN can discover SAN switches, servers, and storage arrays.
Discovery Process
DCNM-LAN discovers devices in several phases, as follows:
1. 2. 3.
CDP neighbor discoveryDiscovers the topology of the interconnected devices, beginning with the seed device and preceding for the number of CDP hops specified when you initiate discovery. Supported device selectionDetermines which of the discovered devices are supported by DCNM-LAN. Discovery continues for the supported devices only. Inventory discoveryDiscovers the inventory of the devices selected in the previous phase. For example, if the device is a Cisco Nexus 7000 Series switch, inventory discovery determines the supervisor modules, I/O modules, power supplies, and fans. If the device is a Cisco Nexus 1000V switch, inventory discovery finds the Virtual Supervisor Module and Virtual Ethernet Modules. Device configuration discoveryDiscovers the details of feature configuration on each device, such as interfaces, access control lists, and VLANs. Network discoveryAssociates network features with the device configuration details discovered in the previous phase.
4. 5.
16-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Interface Link-Status Events Logging Requirement, page 16-4 Logfile Requirements, page 16-4 Logging Severity-Level Requirements, page 16-4
To ensure that these commands are configured on the device, perform the steps in the Verifying the Discovery Readiness of a Cisco NX-OS Device section on page 16-8.
Logfile Requirements
Devices must be configured to store system messages that are severity level 6 or lower in the log file. Although you can specify any name for the log file, we recommend that you do not change the name of the log file. When you change the name of the log file, the device clears previous system messages. The default name of the log file is messages. If you use the default name for the log file, the following command must be present in the running configuration on the device: logging logfile messages 6 To ensure that this command is configured on the device, perform the steps in the Verifying the Discovery Readiness of a Cisco NX-OS Device section on page 16-8.
16-4
OL-25174-02OL-25174-02
Chapter 16
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
VDC Support
When DCNM-LAN discovers a Cisco NX-OS device that supports VDCs, it determines how many VDCs are on the Cisco NX-OS device. In DCNM-LAN, each VDC is treated as a separate device. The status of each VDC is tracked separately and you can configure each VDC independently of other VDCs on a Cisco NX-OS device. Before discovering a Cisco Nexus 7000 Series device that has nondefault VDCs, ensure that each VDC meets the prerequisites for discovery. For more information, see the Prerequisites for Device Discovery section on page 16-7.
16-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
16-6
OL-25174-02OL-25174-02
Chapter 16
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
VDCs, if you are discovering Cisco Nexus 7000 Series devices. CDP The DCNM-LAN server must be able to connect to devices that it discovers. Cisco NX-OS devices must be running a supported release of Cisco NX-OS. For information about supported releases of Cisco NX-OS, see the Cisco DCNM Release Notes, Release 5.x. The Cisco NX-OS device must have the minimal configuration that is required to enable device discovery to succeed. For more information, see the Verifying the Discovery Readiness of a Cisco NX-OS Device section on page 16-8. For a Cisco Nexus 7000 Series device, each VDC that you want to discover must have a management interface configured. DCNM-LAN supports discovery of VDCs that are configured with a management interface that is the mgmt0 interface, which is an out-of-band virtual interface, or with an in-band Ethernet interface that is allocated to the VDC. To allow DCNM-LAN to discover devices that are CDP neighbors, CDP must be enabled both globally on each device and specifically on the device interfaces used for device discovery. For a Cisco Nexus 7000 Series device, CDP must be enabled globally in each VDC and on the management interface that each VDC is configured to use. Discovery of network servers requires that LLDP is enabled globally on devices connected to network servers and specifically on the device interfaces connected to the network adapters on network servers.
Ensure that Cisco NX-OS devices that you want to discover have been prepared for discovery. For more information, see the Verifying the Discovery Readiness of a Cisco NX-OS Device section on page 16-8. DCNM-LAN can manage only devices that run Cisco NX-OS. For more information about supported device operating systems and supported device hardware, see the Cisco DCNM Release Notes, Release 5.x. CDP-based discovery of devices requires that all devices in the chain of CDP hops use the same username and password specified for the seed device. If your security practices do not allow the same username and password to be used on each device, you can perform device discovery for each device individually. Devices that are CDP hops but which are not running Cisco IOS software appear in the Topology feature but cannot be managed by DCNM-LAN.
16-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Verifying the Discovery Readiness of a Cisco NX-OS Device, page 16-8 Discovering Devices, page 16-10 Rediscovering Devices, page 16-11
Note
If you are preparing a physical device that supports virtual device contexts (VDCs), remember that DCNM-LAN considers each VDC to be a device. You must verify discovery readiness for each VDC that you want to manage and monitor with DCNM-LAN.
DETAILED STEPS
Step 1 Step 2 Step 3
Log into the CLI of the Cisco NX-OS device. Use the configure terminal command to access global configuration mode. Ensure that an RSA or DSA key exists so that secure shell (SSH) connections can succeed. To do so, use the show ssh key rsa or show ssh key dsa command. If you need to generate a key, use the ssh key command.
Note
You must disable the SSH server before you can generate a key. To do so, use the no feature ssh command.
Step 4
Ensure that the SSH server is enabled. To do so, use the show ssh server command. If the SSH server is not enabled, use the feature ssh command to enable it. Ensure that CDP is enabled globally and on the interface that DCNM-LAN uses to connect to the device. Use the show run cdp all command to see whether CDP is enabled. Verify that the logging event link-status default and logging event link-status enable commands are configured.
switch(config)# show running-config all | include "logging event link-status" logging event link-status default logging event link-status enable
Step 5 Step 6
16-8
OL-25174-02OL-25174-02
Chapter 16
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
The logging event link-status enable command is included in the default Cisco NX-OS configuration. The show running-config command displays the default configuration only if you use the all keyword.
Step 7
Verify that the device is configured to log system messages that are severity 6 or lower.
Note
The default name of the log file is messages; however, we recommend that you use the log-file name currently configured on the device. If you change the name of the log file, the device clears previous system messages.
If the logging logfile command does not appear or if the severity level is less than 6, configure the logging logfile command.
switch(config)# logging logfile logfile-name 6
Step 8
If the device is a Cisco Nexus 7000 Series switch that is running Cisco NX-OS Release 4.0, you must manually verify that the logging level configuration of the device meets the DCNM-LAN logging level requirements. To do so, follow these steps:
a.
b.
View the logging levels currently configured on the device. The show logging level command displays logging levels only for features that are enabled. The Current Session Severity column lists the current logging level.
switch(config)# show logging level Facility Default Severity ----------------------aaa 3 aclmgr 3 . . . Current Session Severity -----------------------5 3
Note
You can use the show logging level command with the facility name when you want to see the logging level of a single logging facility, such as show logging level aaa.
c.
Determine which logging levels on the device are below the minimum DCNM-LAN required logging levels. To do so, compare the logging levels displayed on page 16-9 to the minimum DCNM-LAN required logging levels that are listed in Table 16-2. For each logging facility with a logging level that is below the minimum DCNM-LAN required logging level, configure the device with a logging level that meets or exceeds the DCNM-LAN requirement.
d.
16-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
switch(config)# logging level facility severity-level
The facility argument is the applicable logging-facility keyword from Table 16-2, and severity-level is the applicable minimum DCNM-LAN required logging level or higher (up to 7).
e. Step 9
Use the show logging level command to verify your changes to the configuration.
Copy the running configuration to the startup configuration to save your changes.
switch(config)# copy running-config startup-config [########################################] 100% switch(config)#
Discovering Devices
You can discover one or more devices. When a discovery task succeeds, DCNM-LAN retrieves the running configuration and status information of discovered Cisco NX-OS devices. Use this procedure for the following purposes:
To discover devices that are not currently managed by DCNM-LAN. For example, you should use this procedure when DCNM-LAN has not yet discovered any devices, such as after a new installation. To discover devices that you have added to your network without rediscovering devices that DCNM-LAN already has discovered. To rediscover the topology when CDP links have changed without rediscovering devices that DCNM-LAN has already discovered.
Note
You must successfully discover a Cisco NX-OS device before you can use DCNM-LAN to configure the device.
Note
The discovery process can perform complete discovery of neighbors only if the neighboring devices are configured with the same credentials as the seed device.
16-10
OL-25174-02OL-25174-02
Chapter 16
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Device Discovery. The discovery tasks appear in the Discovery Tasks area of the Contents pane. In the Seed Device field, enter the IPv4 address of the device that you want DCNM-LAN to connect to when it starts the discovery task. Valid entries are in dotted decimal format. In the User Name field, enter the username of a user account on the device. The user account must have a network-admin or vdc-admin role. In the Password field, enter the password for the user account that you entered in the User Name field. For Catalyst 6500 devices, enter the enable password in the Enable Password field to allow for IOS privileged EXEC mode commands.
Step 5
(Optional) If you want DCNM-LAN to discover devices that are CDP neighbors of the seed device, in the Maximum Hops of Neighbors to Discover field, enter the desired maximum number of hops. By default, the maximum hops is 0 (zero). Ensure that Rediscover Configuration and Status for Existing Devices is unchecked. By default, this check box is unchecked. By leaving this check box unchecked, you enable DCNM-LAN to use previously discovered devices as CDP hops without retrieving their running configuration and status information.
Step 6
Step 7
Click Start Discovery. After a short delay, the discovery task appears at the bottom of the list of tasks in the Discovery Tasks area. DCNM-LAN updates the task status periodically.
Step 8
Wait until the status for the task is Successful. This step may take several minutes. After the status is Successful, you can use DCNM-LAN to configure and monitor the discovered devices. You do not need to save your changes.
Rediscovering Devices
You can rediscover one or more devices.
Note
Rediscovery replaces any configuration data that DCNM-LAN has for a Cisco NX-OS device with the configuration data retrieved during the rediscovery. If you need to discover one or more devices without retrieving configuration and status information for already discovered devices, see the Discovering Devices section on page 16-10. You must successfully discover a Cisco NX-OS device before you can use DCNM-LAN to configure the device.
16-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Device Discovery. The discovery tasks and their status appear in the Discovery Tasks area of the Contents pane. In the Seed Device field, enter the IPv4 address of the device that you want DCNM-LAN to connect to when it starts the discovery task. Valid entries are in dotted decimal format. In the User Name field, enter the username of a user account on the device. The user account must have a network-admin or vdc-admin role. In the Password field, enter the password for the user account that you entered in the User Name field. For Catalyst 6500 devices, enter the enable password in the Enable Password field to allow for IOS privileged EXEC mode commands.
Step 5
(Optional) If you want DCNM-LAN to rediscover devices that are CDP neighbors of the seed device, in the Maximum Hops of Neighbors to Discover field, enter the desired maximum number of hops. By default, the maximum hops is 0 (zero). Check Rediscover Configuration and Status for Existing Devices. By default, this check box is unchecked. By checking this check box, you enable DCNM-LAN to replace any configuration and status information that it has about a previously discovered device with the running configuration and status information retrieved from the device.
Step 6
Step 7
Click Start Discovery. After a short delay, the discovery task appears at the bottom of the list of tasks in the Discovery Tasks area. DCNM-LAN updates the task status periodically.
Step 8
Wait until the status for the task is Successful. This step may take several minutes. After the status is Successful, you can use DCNM-LAN to configure and monitor the discovered devices. You do not need to save your changes.
Where to Go Next
View the discovered devices and configure unique device credentials, as needed. For more information, see the Administering Devices and Credentials section on page 17-1.
16-12
OL-25174-02OL-25174-02
Chapter 16
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Device Discovery Content Pane, page 16-13 Related Fields, page 16-14
Field
Discovery Setting
Description IPv4 address of the first device that you want to discover. Valid entries are in dotted decimal format. By default, this field is blank. Name of the device user account that the DCNM-LAN server uses to access the device. The user account must have network-admin or vdc-admin privileges on the device. By default, this field is blank. Password for the device user account specified in the User Name field. By default, this field is blank. Enable password for Catalyst 6500 devices to allow for IOS privileged EXEC mode commands. Largest permissible number of CDP hops between the DCNM-LAN server and the device. If the server connects to the device but exceeds this number of hops, the discovery fails. The default setting is 0 (zero), which disables the discovery of neighboring devices. Whether the discovery task you are configuring is to replace an existing device discovery that has already completed. By default, this check box is unchecked.
Task ID Owner
Display only. Number assigned to the discovery task. The task ID indicates the order in which discovery tasks occurred. Display only. DCNM-LAN server user account used to start the discovery task. Display only. Date and time of the most recent update to the Status field. Display only. Why the discovery task was created. Display only. State of the discovery task. Valid values are as follows:
Seed Device IP Address Display only. IPv4 address of the seed device. Discovered Time Reason Status
In progressThe discovery tasks are ongoing. SuccessfulThe discovery task completed without errors. FailedThe discovery task completed with errors.
16-13
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Related Fields
For information about fields that configure devices, see the Administering Devices and Credentials section on page 17-1.
Note
DCNM-LAN provides automatic device logging-level support. For more information, see the Automatic Logging-Level Configuration Support, page 16-5. This section provides the following topics that document DCNM-LAN minimum logging levels per supported device type:
Cisco Nexus 7000 NX-OS Logging Levels per DCNM-LAN Feature, page 16-15 Cisco Nexus 5000 NX-OS Logging Levels per DCNM-LAN Feature, page 16-16 Cisco Nexus 4000 NX-OS Logging Levels per DCNM-LAN Feature, page 16-17 Cisco Nexus 1000V NX-OS Logging Levels per DCNM-LAN Feature, page 16-18
16-14
OL-25174-02OL-25174-02
Chapter 16
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Enabled Logging Facility Cisco Nexus 7000 NX-OS by Default? Keyword Logging Facility AAA RADIUS TACACS+ Yes Yes No Yes No No aaa radius tacacs+ cdp lldp dhcp
Device Discovery Topology DHCP snooping Dynamic ARP Inspection IP Source Guard Dot1X Ethernet Interfaces Traffic Storm Control Gateway Load Balancing Protocol (GLBP) Hot Standby Router Protocol (HSRP) Inventory
802.1X Ethernet port manager GLBP HSRP engine Module Platform System manager
dot1x ethpm glbp hsrp module platform sysmgr track port-channel port-security monitor spanning-tree udld vdc_mgr vpc interface-vlan
2 5 3 3 5 5 3 3 5 2 3 3 5 6 2 2
5 5 6 6 5 5 3 6 6 5 6 6 5 6 6 5
Object Tracking Port-Channel Interfaces Port security SPAN Spanning Tree Virtual Device Contexts (VDCs) Virtual Port Channel (vPC) VLAN Network Interfaces
Object tracking Port-channel interfaces Port security SPAN Spanning tree VDC manager VPC Interface VLAN
1. Minimum Cisco DCNM-LAN logging levels appear in bold text for Cisco Nexus 7000 NX-OS logging facilities that have a default logging level that is too low.
16-15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Enabled Logging Facility Cisco Nexus 5000 NX-OS by Default? Keyword Logging Facility AAA RADIUS TACACS+ Yes Yes No Yes No Yes Yes Yes Yes Yes Yes Yes Yes No No No aaa radius tacacs+ cdp lldp ethpm fex sysmgr pfm nohms port-channel monitor spanning-tree udld vpc interface-vlan
Device Discovery Topology Ethernet Interfaces Traffic Storm Control Fabric Extender Inventory
CDP LLDP Ethernet port manager FEX System manager Platform NOHMS
Port-Channel Interfaces SPAN Spanning Tree Virtual Port Channel VLAN Network Interfaces
1. Minimum Cisco DCNM-LAN logging levels appear in bold text for Cisco Nexus 5000 NX-OS logging facilities that have a default logging level that is too low.
16-16
OL-25174-02OL-25174-02
Chapter 16
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Enabled Logging Facility Cisco Nexus 4000 NX-OS by Default? Keyword Logging Facility AAA RADIUS TACACS+ Yes Yes No Yes Yes Yes Yes No Yes Yes Yes No No aaa radius tacacs+ cdp ethpm fip-snooping sysmgr lstsvc port-channel monitor spanning-tree udld interface-vlan
Device Discovery Topology Ethernet Interfaces Traffic Storm Control FIP Snooping Inventory Link State Tracking Port-Channel Interfaces SPAN Spanning Tree VLAN Network Interfaces
CDP Ethernet port manager FIPSM System manager LST Port-channel interfaces SPAN Spanning tree Interface VLAN
1. Minimum Cisco DCNM-LAN logging levels appear in bold text for Cisco Nexus 4000 NX-OS logging facilities that have a default logging level that is too low.
16-17
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Enabled Logging by Facility Default? Keyword Yes Yes No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes aaa radius tacacs+ cdp ethpm ifmgr vim module platform sysmgr msp port-channel port-profile vms monitor
CDP Ethernet port manager Ifmgr VIM Module Platform System manager
1. Minimum Cisco DCNM-LAN logging levels appear in bold text for Cisco Nexus 1000V NX-OS logging facilities that have a default logging level that is too low.
Related Documents
Related Topic Device and Credentials Document Title Chapter 17, Administering Devices and Credentials
16-18
OL-25174-02OL-25174-02
Chapter 16
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Related Topic Network servers Cisco NX-OS XML management interface Document Title Chapter 20, Configuring Network Servers Cisco NX-OS XML Interface User Guide
Standards
Standards NETCONF protocol over the Secure Shell (SSH) Title RFC 4742
Feature Name Discovery of various supported devices LLDP discovery Fibre Channel discovery Automatic logging-level configuration support
Feature Information Support was added for this feature. Support was added for this feature. Support was added for this feature. Support was added for this feature.
16-19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
16-20
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
17
Information About Devices and Credentials, page 17-1 Licensing Requirements for Devices and Credentials, page 17-2 Prerequisites for Administering Devices and Credentials, page 17-3 Guidelines and Limitations for Devices and Credentials, page 17-3 Configuring Devices and Credentials, page 17-3 Viewing Device Credentials and Status, page 17-9 Field Descriptions for Devices and Credentials, page 17-10 Additional References for Devices and Credentials, page 17-11 Feature History for Devices and Credentials, page 17-11
Devices, page 17-1 Credentials, page 17-2 Device Status, page 17-2 VDC Support, page 17-2
Devices
The Devices and Credentials feature allows you to administer the management state of devices. If the managed physical device supports virtual device contexts (VDCs), DCNM-LAN represents each VDC as a device. If you need to retrieve the running configuration and status information of a single VDC on a physical device with multiple VDCs, rather than performing device discovery for all the VDCs on the physical device, you can use the Devices and Credentials feature to rediscover the single device that represents the changed VDC.
17-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Credentials
Devices and Credentials supports the ability to secure each managed device with different credentials. DCNM-LAN allows you to configure unique credentials for each discovered device or use default credentials when you do not configure unique credentials for a device. If some managed devices share the same credentials but others do not, you can configure unique credentials for some devices and configure the default credentials with the credentials that are shared by some of the managed devices. Devices and Credentials associates a unique set of device credentials with each DCNM-LAN server user which means that the accounting logs on managed devices reflect the actions of each DCNM-LAN server user. If you log into the DCNM-LAN client as a user who does not have device credentials configured, the DCNM-LAN client prompts you to configure device credentials for the user account. If support for accounting is not important to your organization, you must still configure each DCNM-LAN server user with device credentials, even if the credentials specified for each user are the same.
Device Status
The Devices and Credentials feature shows the status each device. The possible status are as follows:
ManagedDCNM-LAN can connect to the device using Secure Shell (SSH), configure the running configuration of the device, and retrieve logs and other data from it. This status is possible only for devices that run a supported release of Cisco NX-OS and that are configured properly to support discovery by DCNM-LAN. For more information, see the Verifying the Discovery Readiness of a Cisco NX-OS Device section on page 16-8. UnmanagedDCNM-LAN does not manage the device or monitor the status of the device. UnreachableDCNM-LAN cannot connect to the device, which was a managed device prior to becoming unreachable. Common causes for this status are as follows:
A network issue is preventing the DCNM-LAN server from contacting the device. SSH is disabled on the device. All terminal lines on the device are in use.
VDC Support
For devices that support VDCs, DCNM-LAN treats each VDC on a physical device as a separate device; therefore, DCNM-LAN can maintain unique credentials for each VDC on a device. DCNM-LAN tracks the status of each VDC separately, as well.
17-2
OL-25174-02OL-25174-02
Chapter 17
Administering Devices and Credentials Prerequisites for Administering Devices and Credentials
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The DCNM-LAN server must be able to connect to a device that you want to discover. Cisco NX-OS devices must be running a supported release of Cisco NX-OS. For information about supported releases of Cisco NX-OS, see the Cisco DCNM Release Notes, Release 5.x. The Cisco NX-OS device must have the minimal configuration that is required to enable device discovery to succeed. For more information, see the Verifying the Discovery Readiness of a Cisco NX-OS Device section on page 16-8.
Discovering a device by using the Devices and Credentials feature does not support CDP-based discovery of neighboring devices. To use CDP-based discovery, see the Administering Device Discovery section on page 16-1. Be careful when you change the default credentials or device-specific credentials. Incorrect credentials prevent DCNM-LAN from managing devices.
Adding a Device, page 17-3 Discovering a Device, page 17-4 Unmanaging a Device, page 17-5 Deleting a Device, page 17-5 Configuring Default Device Credentials, page 17-6 Clearing Default Device Credentials, page 17-7 Configuring Unique Credentials for a Device, page 17-7 Clearing Unique Credentials for a Device, page 17-8
Adding a Device
You can add a device. After you add a device, you can discover it. For more information, see the Discovering a Device section on page 17-4.
17-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Devices and Credentials. The discovered devices appear in the Devices area of the Contents pane. From the menu bar, choose Actions > New Device. A blank row appears in the Devices area on the Contents pane. In the IP Address column for the new device, enter the IPv4 address that DCNM-LAN must use to connect to the device. Press Enter. (Optional) If you need to add unique device credentials, in the User Credentials column, double-click the entry for the device that you added, click the down-arrow button, and configure the unique device credentials. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server. The status of the new device is Unmanaged.
Step 2
Step 6
Discovering a Device
You can discover a device. Discovering an unmanaged device changes its status to Managed. During the discovery, DCNM-LAN retrieves the running configuration of the device. If you are rediscovering a device, the configuration data that DCNM-LAN retrieves replaces any existing configuration data for the device. Whenever the configuration data that DCNM-LAN has for the device is not accurate, such as when a device administrator has used the command-line interface to change the running configuration, you can use this procedure to update the configuration data that DCNM-LAN has for the device.
Note
Discovering a device does not affect the running configuration of the device.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Devices and Credentials. The discovered devices appear in the Devices area of the Contents pane. Click the device that you want to discover. From the menu bar, choose Actions > Discover. The device discovery begins. The status of the device changes to Discovering.
Step 2 Step 3
17-4
OL-25174-02OL-25174-02
Chapter 17
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 4
Wait for the status to change to Managed. Typically, the device discovery occurs in less than 5 minutes. After the status changes to Managed, you can use DCNM-LAN to configure the device. You do not need to save your changes.
Unmanaging a Device
You can change the status of a device to unmanaged.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Devices and Credentials. The discovered devices appear in the Devices area of the Contents pane. Click the device whose status you want to change to unmanaged. From the menu bar, choose Actions > Unmanage. After a short delay, the status of the device changes to Unmanaged. You do not need to save your changes.
Step 2 Step 3
Deleting a Device
You can delete a device. When you delete a device, you delete all configuration data about the device from DCNM-LAN. You should consider deleting devices that you do not intend to manage with DCNM-LAN. Additionally, if a network administrator of a device that supports VDCs uses the command-line interface of the device to delete a VDC, you should delete from DCNM-LAN the device that represented the VDC.
Note
Deleting a device does not affect the running configuration of the device.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Devices and Credentials. The discovered devices appear in the Devices area of the Contents pane.
17-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2 Step 3
Click the device that you want to delete. From the menu bar, choose Actions > Delete. The device disappears from the Devices area. You do not need to save your changes.
Note
Note
We recommend that you use a strong password. Common guidelines for strong passwords include a minimum password length of eight characters and at least one letter, one number, and one symbol. For example, the password Re1Ax@h0m3 has ten characters and contains uppercase and lowercase letters in addition to one symbol and three numbers.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Devices and Credentials. The Default Credentials area appears in the Contents pane, above the Devices area, which lists the discovered devices.
Step 2
In the User Name field, enter the username for the default credentials. A valid username can be 1 to 32 characters. Valid characters are numbers, symbols, and case-sensitive letters.
To the right of the Password field, click the down-arrow button. In the Password field and the Confirm Password field, enter the password for the default credentials. Valid passwords are numbers, symbols, and case-sensitive letters.
Note Step 5
Click OK.
17-6
OL-25174-02OL-25174-02
Chapter 17
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 6
From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Note
If you clear the default device credentials, DCNM-LAN can connect to discovered devices only if you have configured unique credentials for each managed device.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Devices and Credentials. The Default Credentials area appears in the Contents pane, above the Devices area, which lists the discovered devices.
Step 2
In the Default Credentials area, click Clear. The User Name field and the Password field clear. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Step 3
Note
17-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
We recommend that you use a strong password. Common guidelines for strong passwords include a minimum password length of eight characters and at least one letter, one number, and one symbol. For example, the password Re1Ax@h0m3 has ten characters and contains uppercase and lowercase letters in addition to one symbol and three numbers.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Devices and Credentials. The discovered devices appear in the Devices area of the Contents pane. In the User Credentials column for the device, double-click the entry and then click the down-arrow button. In the User Name field, enter the username. Valid usernames are between 1 and 32 characters. Valid characters are numbers, symbols, and case-sensitive letters.
Step 2 Step 3
Note Step 4
In the Password field and the Confirm Password field, enter the password. Valid passwords are numbers, symbols, and case-sensitive letters.
Click OK. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Note
If you clear the unique credentials for a discovered device, DCNM-LAN uses the default credentials to connect to the device.
17-8
OL-25174-02OL-25174-02
Chapter 17
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Devices and Credentials. Discovered devices appear in the Devices area of the Contents pane. In the User Credentials column for the device, double-click the entry and then click the down-arrow button. In the User Name field, delete all text. In the Password field, delete all text. In the Confirm Password field, delete all text. Click OK. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Auto synchronization for device is disabled by user Logging levels required by DCNM-LAN are not configured on the device
17-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Reason Error in SSH connection Unreachable Discovery failed because server node stopped/crashed Syslog messages logging disabled on device Resolution Ensure that SSH is enabled on the device and that it is functioning properly. Discover the device again. Ensure that you specify the correct IP address for the device. Ensure that DCNM-LAN can contact the device. Discover the device again. Discover the device again. Discover the device again.
For information about the fields that appear, see the Field Descriptions for Devices and Credentials section on page 17-10.
Field
Default Credentials
Description Name of the Cisco NX-OS device user account that the DCNM-LAN server uses to access any device that it is discovering or that it is managing. On the device, the user account must be assigned to the network-admin or vdc-admin role. By default, this field is blank.
Note
User Name
The information in the User Credentials field in the Devices area overrides the information in the Default Credentials section.
Password
Devices
Password for the Cisco NX-OS device user account specified in the User Name field. By default, this field is blank. Display only. IPv4 address of the Cisco NX-OS device. Display only. Name of the Cisco NX-OS device. The Cisco NX-OS user account that DCNM-LAN uses to connect to the Cisco NX-OS device.
Note
If you configure this field, DCNM-LAN uses the user account that you configure when it connects to the device. If this field is blank, DCNM-LAN uses the user account specified in the Default Credentials area. By default, this field is blank.
17-10
OL-25174-02OL-25174-02
Chapter 17
Administering Devices and Credentials Additional References for Devices and Credentials
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 17-1 Device and Credentials Content Pane (continued)
Field Status
Description Display only. Whether the DCNM-LAN server can connect to and configure the device. Valid values are as follows:
ManagedThe DCNM-LAN server can configure the device. UnmanagedThe DCNM-LAN server cannot configure the device. UnreachableThe DCNM-LAN server cannot reach the device.
Reason
Display only. Provides a brief explanation for the device status. For more information, see the Viewing Device Credentials and Status section on page 17-9.
Related Documents
Related Topic Cisco NX-OS XML management interface Document Title Cisco NX-OS XML Interface User Guide
Standards
Standards NETCONF protocol over the Secure Shell (SSH) Title RFC 4742
Releases 5.0(2)
Feature Information The Reason field was added to the Devices and Credentials feature.
17-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
17-12
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
18
Information About DCNM-LAN Licensed Devices, page 18-1 Licensing Requirements for Administering DCNM-LAN Licensed Devices, page 18-2 Prerequisites for Administering DCNM-LAN Licensed Devices, page 18-2 Guidelines and Limitations for Administering DCNM-LAN Licensed Devices, page 18-2 Configuring DCNM-LAN Licensed Devices, page 18-2 Viewing DCNM-LAN Licensed Devices, page 18-4 Field Descriptions for DCNM-LAN Licensed Devices, page 18-4 Additional References, page 18-5 Feature History for DCNM-LAN Licensed Devices, page 18-5
18-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
You must install one or more LAN Enterprise licenses. For more information, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. You must discover the devices that you want to add to the list of DCNM-LAN-licensed devices. For more information, see the Discovering Devices section on page 16-10.
You can add only managed devices to the list of licensed devices. You can add to the list of licensed devices only as many devices as permitted by all of the LAN Enterprise licenses that you have installed. When you remove a device from the list of licensed devices, the device is removed from DCNM-LAN. If the physical device supports virtual device contexts (VDCs), all the VDCs on the device are removed from DCNM-LAN. To continue managing the device, you must discover the device. For more information, see the Discovering Devices section on page 16-10.
Adding Devices to the Licensed Devices List, page 18-3 Removing Devices from the Licensed Devices List, page 18-3
18-2
OL-25174-02OL-25174-02
Chapter 18
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > DCNM Licensed Devices. The Contents pane displays the list of licensed devices. From the menu bar, choose Actions > New. The DCNM-LAN client adds a row to the list and the Available Devices dialog box lists available and selected physical devices.
Step 2
Step 3 Step 4
From the Available Devices list, choose the physical devices that you want to add to the license and then click Add. Click OK. The Contents pane displays a list of licensed devices, including the devices that you added. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server. You can begin using licensed DCNM-LAN features when you manage the device.
Step 5
Note
When you remove a physical device from the list of licensed devices, the device and all of its VDCs are removed from DCNM-LAN. To continue managing the device, you must discover the device. For more information, see the Discovering Devices section on page 16-10.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > DCNM Licensed Devices. The Contents pane displays the list of licensed devices. For each device that you want to remove from the list of licensed devices, follow these steps:
a.
Step 2
Choose the device that you want to remove from the list of licensed devices.
18-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
b.
From the menu bar, choose Actions > Delete. The DCNM-LAN client displays a confirmation dialog box. Click Yes. The DCNM-LAN client removes the device from the list of licensed devices.
c.
Note
Devices that you remove from the list of licensed devices are no longer managed by DCNM-LAN.
Step 3
(Optional) To continue managing devices that you removed from the list of licensed devices, discover the devices. For more information, see the Discovering Devices section on page 16-10.
Description Display only. Sum of devices licensed by all Cisco DCNM Enterprise LAN licenses installed. For example, if you installed two licenses that each support 5 devices, this field would display 10. Display only. Sum of Nexus 7000 devices licensed (permanent license) by all Cisco DCNM Enterprise LAN licenses installed.
Total N7K Trial License Display only. Sum of Nexus 7000 devices licensed (trial license) by all Cisco Count DCNM Enterprise LAN licenses installed. Total N5K, N4K, N3K, N1K License Count Total Remaining License Count Total Remaining N7K License Count Display only. Sum of Nexus 5000, Nexus 4000, Nexus 3000, and Nexus 1000 devices licensed by all Cisco DCNM Enterprise LAN licenses installed. Display only. Sum of remaining licenses Display only. Sum of remaining Nexus 7000 device licenses.
18-4
OL-25174-02OL-25174-02
Chapter 18
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 18-1 DCNM-LAN Licensed Devices Content Pane (continued)
Field Total Remaining N5K, N4K, N3K, N1K License Count Switch Name Virtual Devices
Description Display only. Sum of remaining Nexus 5000, Nexus 4000, Nexus 3000, and Nexus 1000 device licenses. Display only. Name of a licensed physical device. You can use licensed DCNM-LAN features on the device. Display only. Each virtual device context (VDC) that is configured on the physical device. If the physical device does not support VDCs, this field is empty.
Additional References
For additional information related to administering DCNM-LAN Licensed Devices, see the following sections:
Related Documents
Related Topic Installing a Cisco DCNM Enterprise LAN license Document Title Cisco DCNM Installation and Licensing Guide, Release 5.x
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Releases 5.0(2)
18-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
18-6
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
19
Information About Topology, page 19-1 Licensing Requirements for Topology, page 19-8 Prerequisites for Topology, page 19-8 Guidelines and Limitations, page 19-8 Using the Topology Feature, page 19-8 Related Documents, page 19-30 Feature History for Topology, page 19-31
Map Views, page 19-2 Layouts, page 19-5 vPC Support, page 19-6 DCNM-SAN Support, page 19-6 FabricPath Support, page 19-6 Device Groups, page 19-7
19-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Map Views
The topology map includes four views of your topology as described in the following topics:
Physical View, page 19-2 PortChannel and vPC, page 19-3 Logical vPC View, page 19-4 L2 View, page 19-5
Physical View
The Physical View (see Figure 19-1) shows the physical connections between discovered devices. This is the default topology view.
Figure 19-1 Physical View of the Topology Map
19-2
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
19-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
19-4
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
L2 View
The L2 view (see Figure 19-4) shows VLANs configured among discovered devices. Beginning with Cisco DCNM-LAN Release 5.1, the VSAN Overlay is a part of the L2 view. The VSAN Overlay feature enables you to view the Fibre Channel (FC) and Fibre Channel over Ethernet (FCoE) links that are active for a given VSAN or a range of VSANs. It also provides a visual representation of forwarding and non-forwarding links between Cisco Nexus devices in a data center network for configured VLANs.
Figure 19-4 L2 View of the Topology Map
Layouts
The topology map enables you to move devices to where you want them. You can save the layout so that the next time you use the topology map, devices are where you placed them. The DCNM-LAN client saves topology layouts as local user data on the computer that runs the DCNM-LAN client. When you are using the DCNM-LAN client, you do not have access to topology layouts that you saved on other computers or that you saved while logged in to the computer under a different username. In addition to saved layouts, when you are using the Physical View, you can load one of the following layouts:
SpringDevices appear in locations determined by weighting the connections, which often produces a layout with minimal or no crossed connections. TreeDevices appear in a tree unless connections create loops among the devices, in which case devices appear in a spanning tree, that is, a grid in which most of the connections follow the grid layout.
19-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
vPC Support
The topology map provides the following additional vPC-specific features:
vPC creationYou can launch the vPC Creation Wizard from the PortChannel and vPC view. See the Launching the vPC Wizard section on page 19-28. Quick access to the vPC featureYou can access the configuration for a specific vPC from the PortChannel and vPC view or the Logical vPC View. See the Managing a vPC section on page 19-28. vPC configuration inconsistencyYou can see vPC links and vPC peer links that have configuration inconsistencies. You can open the Resolve Configuration Consistency dialog box from the topology map. See the Finding and Resolving vPC Configuration Inconsistencies section on page 19-29.
DCNM-SAN Support
The DCNM-LAN topology map supports Cisco Data Center Network Manager for SAN (DCNM-SAN) by providing the features described in the following topics:
Common Topology
The topology map can show storage area network (SAN) connections and devices in addition to Ethernet LAN connections and devices. You can use the DCNM-LAN topology map to view your entire data center network.
FabricPath Support
FabricPath support for L2MP capable devices, running the L2MP-ISIS protocol, is available in the L2 View of the Topology drawer. The L2 View contains a dialog box that allows you to select the type of graph to display. When you select the Fabricpath view in the dialog box, you can display the following types of graphs:
19-6
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Multi-destination A multi-destination or broadcast graph represents broadcast traffic and unknown unicast traffic in the topology.
Reachability L2MP-ISIS automatically computes the switch ID reachability for each node in the network. Unicast A unicast graph displays equal cost routes between nodes in a network. Multicast A multicast graph displays the multicast traffic from a specified device to all hosts that are listening to a particular IGMP group.
In addition, the FabricPath Topology Wizard can be launched from the L2 View. The FabricPath Topology Wizard allows you to do many operations, such as add to the FabricPath topology, display inventory, and display end devices.
Note
The FabricPath Topology Wizard is not supported in Cisco NX-OS Release 5.1(1).
Note
Starting from Cisco DCNM Release 6.1(1) the fabric path suppport feature will be available for the Cisco Nexus 55xx series switches. Starting from Cisco DCNM Release 6.1(1) the fabric path suppport feature will be licensed.
To launch the wizard, you need to select more than one device and right-click to display a context menu that lists the available operations. You can select multiple devices by holding down the shift key and clicking on the appropriate devices displayed on the graph. Alternatively, you may hold down the left mouse key and drag over the appropriate devices.
Device Groups
Device groups allow you to simplify the visualization of interconnections between groups of devices in the topology map. You can categorize devices into device groups that you define, which allows you to focus on a limited number of devices when you view the topology. You can manage device groups using the topology map, which allows you to create groups, delete groups, and move devices among groups; however, the Device Groups feature is especially useful for assigning multiple devices to groups easily. For more information about device groups, see Chapter 21, Configuring Device Groups.
Network Servers
The topology map can show network servers. You can use the Network Servers feature to associate host bus adapters (HBAs) and Ethernet network adapters that DCNM-LAN discovered with the Link Layer Discovery Protocol (LLDP) to network servers. For more information, see Chapter 20, Configuring Network Servers.
19-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The topology map shows only devices that DCNM-LAN has discovered. For full support on the topology map, discovered devices should have the applicable discovery protocols enabled, both globally and on active interfaces. For more information about the discovery protocols used by DCNM-LAN, see Chapter 16, Administering Device Discovery.
While the Topology feature is an unlicensed feature, you must have a LAN Enterprise license to manage the nondefault VDCs of Cisco Nexus 7000 Series switches that appear in the topology. The Topology feature displays changes to the topology periodically as determined by the polling frequency for accounting and system logs. By default, the polling frequency is one minute. For more information, see the Information About Auto-Synchronization with Devices section on page 23-1.
Opening the Topology Map, page 19-9 Understanding Device Icons and Links, page 19-10 Using the Viewing Tools, page 19-12 Showing, Hiding, and Using the Details Pane, page 19-13 Moving Devices in the Topology Map, page 19-14 Loading a Layout, page 19-15 Reloading the Previously Saved Layout, page 19-16 Showing a Virtual or Physical Chassis, page 19-16 Showing or Hiding Network Servers, page 19-17 Managing a Network Server, page 19-17
19-8
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Showing or Hiding Device Groups, page 19-18 Expanding or Collapsing Device Groups, page 19-18 Creating a Device Group, page 19-19 Moving a Device Between Device Groups, page 19-19 Removing a Device from a Device Group, page 19-20 Copy Run to Start, page 19-21 Deleting a Device Group, page 19-22 Exporting the Topology as a JPG Image, page 19-22 Accessing DCNM-LAN Features from the Topology Map, page 19-23 Accessing Cisco DCNM-SAN Features from the Topology Map, page 19-24 Accessing Cisco FabricPath Features from the Topology Map, page 19-25 Launching the vPC Wizard, page 19-28 Managing a vPC, page 19-28 Finding and Resolving vPC Configuration Inconsistencies, page 19-29 Accessing Remotely Connected CNAs from the Topology Map, page 19-29 Using VSAN Overlay, page 19-30
Note
Before discovery, if you are working with FabricPath, you must use the Command-Line-Interface (CLI) to accomplish the following:
Install the Enhanced Layer 2 license on the device. See the Cisco NX-OS Licensing Guide for complete information on installing this license. Install the FabricPath feature set on the device. See the Cisco Configuring Feature Set for FabricPath Guide for complete information on installing the feature set. Configure the FabricPath feature set so that it can be enabled in a custom VDC. See the Cisco Configuring Feature Set for FabricPath Guide for complete information on configuring the feature set.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. Buttons for each of the available topology views appear above the topology map.
Step 2
(Optional) If you want to change topology views, click the topology view name. The topology map shows the view of the topology that you selected. (Optional) If you want to use a view-specific option, see the following table:
Step 3
19-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Available In View
How to Use Right-click in the map and choose Show All VDCs or Hide All VDCs. When you view all VDCs, Cisco Nexus 7000 Series devices appear as gray boxes that contain device icons for each VDC configured on the Cisco Nexus 7000 Series device.
Physical View
Right-click in the map and choose Show End Devices or Hide End Devices.
1.
If the VLANs box does not appear on the map, click the Filter icon on the topology toolbar. Enter a list of VLAN IDs. You can specify a single VLAN ID, a range of VLAN IDs, or comma-separated IDs and ranges. Click Filter. On the map, find the VLANs box. Check or uncheck the Show Non-Forwarding Link (Blocking & Disabled) as needed. On the map, find the gray box that contains the Show vPC check box and the Show Port Channel check box. You may need to scroll the map or zoom out to find the gray box. Check or uncheck the check boxes as needed.
2.
3.
L2 View
1. 2.
1.
2.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. Buttons for each of the available topology views appear above the topology map.
Step 2
(Optional) If you want to change topology views, click the topology view name.
19-10
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The topology map shows the view of the topology that you selected. The topology toolbar appears on the left side of the topology map.
Step 3
icon.
The Legend dialog box displays information about the device icons and links that may appear in the currently selected topology view.
19-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Click the
icon.
Click anywhere on the topology map, and hold down the mouse button. Drag the map in any direction. Release the mouse button. Click the icon.
Select
Click the device, link, or port icon that you want to work with. A balloon displays information about the icon that you clicked.
Zoom in Rect
Click the
icon.
Click on the map and drag a rectangle over the area that you want to see, and release the mouse button. icon. icon.
Zoom In Zoom Out Fit to View Reset Zoom Load Layout Reload Layout Show Device Groups Search
Fits the entire topology of discovered devices within the topology map. Click the icon. Resets the zoom to the default magnification. Click the Loads a layout. Loads the most recently saved layout. See the Reloading the Previously Saved Layout section on page 19-16. Shows or hides device groups. See the Showing or Hiding Device Groups section on page 19-18. Allows you to use the device search tool, so that you can search for a device by its name.
1. 2. 3. Tip
icon.
icon.
In the Device box, enter all or some of the name of the device that you want to search for, and then click the icon. To hide the Search tool, click the icon again. You can move the Search tool on the topology map by clicking and dragging it when you have the Select tool enabled.
Save Layout
Saves changes that you have made to the device icon layout. See the Moving Devices in the Topology Map section on page 19-14.
19-12
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Viewing Tool Icon and Name Hide/Show Details Legend Export as JPG
How to Use Shows and hides the details pane. See the Showing, Hiding, and Using the Details Pane section on page 19-13. Opens the Legend dialog box. See the Understanding Device Icons and Links section on page 19-10. Saves the topology map as a JPG image file. See the Exporting the Topology as a JPG Image section on page 19-22.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Tip
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear. icon.
Step 2
When you choose to show details, the Details pane appears between the topology toolbar and the topology map.
Tip Step 3
Ensure that the Select tool is selected. To select the Select tool, click the
icon.
To use the sections within the Details pane, see the following table: Section VDC View Available In
How to Use Explore the VDC View tree to see which Cisco Nexus 7000 Series devices contain VDCs. To see details about a device, click on it and see the Properties section. Explore the vPC tree to see a categorized listing of all logical connections in the topology map. To see details about a vPC, vPC peer link, or a port channel, click on it and see the Properties section.
vPC
19-13
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Section Overview Available In
How to Use
Tip
All views
To view the Overview section, you may need to click the Overview tab in the Properties section. The Overview and Properties sections share the same section title bar.
The Overview section shows a thumbnail view of the whole topology. A blue rectangle indicates the portion of the topology that is currently shown in the map.
To change which portion of the topology is shown in the map, in the overview, click where you want the map to show. To zoom in or out, click a corner of the blue rectangle and drag it until the map is enlarged or shrunk as you want. To view the Properties section, you may need to click the Properties tab in the Overview section. The Overview and Properties sections share the same section title bar. Do one of the following:
In the VDC View section, click on a physical or
Properties
All views
Tip
1.
virtual device.
In the vPC section, click on a logical connection. In the topology map, click on a device, link, or
port.
2.
In the Properties section, view the properties of the object that you selected.
19-14
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
The DCNM-LAN client saves topology layouts as local user data on the computer that runs the DCNM-LAN client. When you are using the DCNM-LAN client, you do not have access to topology layouts that you saved on other computers or that you saved while logged in to the computer under a different username.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear. icon.
Step 2 Step 3
Find and move device icons as needed. To move an icon, click on the device icon, hold down the mouse button, drag the icon to the new location, and release the mouse button. You can zoom and pan as needed to find icons. For more information, see the Using the Viewing Tools section on page 19-12. (Optional) If you want to save the changes to the device icon layout, click the icon.
Step 4
Loading a Layout
When you are using the Physical View, you can choose to load a layout. The position of devices is shared by all the topology views. This behavior allows you to use any of the layouts in all views by loading the layout in the Physical View and then choosing another view.
Note
If you are using a different view than the Physical View, the icon on the topology toolbar acts the same as the icon. For information about using the icon, see the Reloading the Previously Saved Layout section on page 19-16.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
19-15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2 Step 3
(Optional) For each physical device that you want to appear at the top of the layout, right-click on the device icon and choose Make as Core Switch. From the topology toolbar, click the The Layout drop-down list appears. icon.
Step 4
From the Layout drop-down list, choose the layout that you want to load. The Physical View of the topology map changes to the layout that you selected. Any devices that you specified as core switches appear at the top of the map, with devices that are one CDP hop away from the core switches appearing just below them.
Note
The DCNM-LAN client saves topology layouts as local user data on the computer that runs the DCNM-LAN client. When you are using the DCNM-LAN client, you do not have access to topology layouts that you saved on other computers or that you saved while logged in to the computer under a different username.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear. icon.
Step 2
The topology map changes to the most recent layout that you saved.
19-16
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Step 2
Find the Cisco Nexus 1000V device icon. The topology map displays either the virtual chassis or the physical chassis. Right-click on the device icon and choose the applicable option:
Step 3
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Step 2 Step 3
Find the device that is connected to network servers that you want to show or hide. Right-click on the device and choose one of the following:
To show connected network servers, choose Show End Devices. To hide connected network servers, choose Hide End Devices.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
19-17
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2
Find the network server that you want to manage with the Network Servers feature.
Tip
If the network server does not appear on the map, right-click a device that it is connected to and choose Show End Devices.
Step 3
Right-click on the server and choose Manage Server. The DCNM-LAN client opens to the Network Servers feature. If the server that you chose represents a managed server or an Ethernet adapter on a discovered server, the client opens to the Servers contents pane. If the server that you chose represents a host bus adapter (HBA) that is not correlated or bound to a server, the client opens to the Static Server-Adapter Mapping contents pane.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
The icon on the topology toolbar controls whether device groups appear on the topology map. When the icon appears to be pushed in, the topology map shows device groups. When the icon does not appear to be pushed in, the topology map hides device groups.
Step 2
Click the
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View.
19-18
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear. icon.
Step 2 Step 3
If device groups do not appear on the topology map, from the topology toolbar, click the Do one of the following:
If you want to expand a single device group, right-click on the device group icon and choose Expand Device Group. If you want to expand all device groups, right-click on a blank area of the map and choose Expand all Device Groups. If you want to collapse a single device group, right-click on the title of the device group and choose Collapse Device Group. If you want to collapse all device groups, right-click on a blank area of the map and choose Collapse all Device Groups.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2
Right-click on a blank area of the map and choose New Device Group. A dialog box appears, with a field for specifying a name for the new device group. Type a name for the device group and click OK. The new device group appears on the topology map.
Step 3
19-19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
If a device group is empty after you move a device out of the group, DCNM-LAN deletes the device group.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear. icon.
If device groups do not appear on the topology map, from the topology toolbar, click the Find the device group that you want to move the device out of. If the device group is collapsed, double-click the device group to expand it. Right-click on the device that you want to move out of the group and choose Cut. Find the device group that you want to move the device into.
Tip Step 7
You do not need to expand the device group before moving the device into the group.
Tip
If the device group is expanded, you must click on the title of the device group.
A warning dialog box confirms that you want to move the device group.
Step 8
Click Yes. DCNM-LAN adds the device to the second device group and removes it from the first device group. If the first device group is empty after moving the device, DCNM-LAN deletes the first device group.
19-20
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear. icon.
If device groups do not appear on the topology map, from the topology toolbar, click the Find the device group that you want to remove a device from. If the device group is collapsed, double-click the device group to expand it.
Right-click on the device that you want to remove from the group and choose Remove from Group. If you are removing the only device from the group, a warning dialog box confirms that you want to remove the device group.
Step 6
If the warning appears, click Yes. DCNM-LAN removes the device from the custom device group and adds the device to the default device group.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear. icon.
If device groups do not appear on the topology map, from the topology toolbar, click the Above the topology map, select Physical View. Select the devices that you want to copy the running configuratiion from. If the device group is collapsed, double-click the device group to expand it. Right-click the device that you want to copy the running configuration from.
If you want to copy the running configuration to the startup configuration, choose Copy Run to Start. DCNM-LAN copies the running configuration to the startup configuration.
19-21
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
If you want to copy the running configuration to a file in the bootflash directory, choose Copy Run to File in Bootflash. In the dialog box that appears, enter the name of the file to copy to and click OK to complete the operation. DCNM-LAN copies the running configuration to the specified file.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear. icon.
If device groups do not appear on the topology map, from the topology toolbar, click the Find the device group that you want to delete. Right-click on the device group and choose Delete Group.
DCNM-LAN removes the device group from the topology map. The devices that were in the deleted device group are now members of the default device group.
Note
If there are no custom device groups after you delete the device group, the topology map automatically hides devices groups because all devices are in the default device group.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
19-22
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2
View the portion of the topology map that you want to save. For more information, see the Using the Viewing Tools section on page 19-12. Arrange the device icons as desired. For more information, see the Moving Devices in the Topology Map section on page 19-14. From the topology toolbar, click the icon.
Step 3
Step 4
A dialog box prompts you to choose whether you want to export the entire topology map or only the visible portion of the map.
Step 5
To export the entire topology map as a JPG image, click Yes. To export only the visible portion of the topology map, click No.
Step 6
Specify the location and filename of the JPG image and click Save. The JPG image of the visible portion of the topology map is saved.
You can also use the topology map to access the Device Discovery feature.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2
If you want to access a DCNM-LAN feature for a specific managed device, do the following:
a.
19-23
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
b.
Right-click the device and choose the feature that you want to configure. The feature that you selected appears in the Contents pane. The device that you selected on the topology map is selected in the Summary table for the feature.
Step 3
If you want to access the Device Discovery feature, right-click a blank area on the map and choose Discover Devices. The Device Discovery feature appears in the Contents pane.
Zones, zone sets, and zone set membership Port channel interfaces Fibre Channel physical and logical interfaces Fibre Channel over IP tunnels Events
Note
The Cisco DCNM-SAN cross launch feature is only supported by the DCNM-LAN client when the Cisco DCNM-SAN is installed in Server mode. Cross launch is not supported by the DCNM-LAN client when the Cisco DCNM-SAN is installed in Standalone mode. In addition, cross launch is not supported when the DCNM-LAN client is in standalone mode.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2 Step 3
Find the SAN device in the topology map. Right-click the device and choose the feature that you want to configure. The Cisco DCNM-SAN client opens to the feature that you selected.
19-24
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Multi-destination, page 19-25 Device Reachability, page 19-25 Unicast, page 19-26 Multicast, page 19-27
Multi-destination
A multi-destination or broadcast graph represents broadcast traffic and unknown unicast traffic in the topolgy. You can view the multi-destination information for a specific topology.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2
Above the map, click L2 View. The dialog box appears in the Contents pane. In the dialog box, choose the Fabricpath view. Enter the Topology ID and click Fetch. The graph that is displayed is filtered based upon the Topology ID. Check Select type of graph to enable the selection for the Multi-destination graph. Check the Multi-destination option. From the Anchor drop-down list, choose a device. The selected device is the entry point for the graph. From the Graph ID drop-down list, choose an ID. The Graph ID is a forwarding tag for the graph. Click Fetch to view the graph.
Device Reachability
L2MP-ISIS automatically computes the switch ID reachability for each node in the network. You can view the reachability information for a specific topology.
19-25
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2
Above the map, click L2 View. The dialog box appears in the Contents pane. In the dialog box, choose the Fabricpath view. Enter the Topology ID. The graph that is displayed is filtered based upon the Topology ID. Check Select type of graph to enable the selection for the Reachability graph. Check the Reachability option. From the Anchor drop-down list, choose a device. The selected device is the entry point for the graph. Click Fetch to view the graph.
Note
Devices in the graph that appear as red colored icons indicate that the device is not reachable for the selected topology.
Unicast
A unicast graph displays equal cost routes between nodes in a network. You can view the unicast information for a specific topology.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2
Above the map, click L2 View. The dialog box appears in the Contents pane. In the dialog box, choose the Fabricpath view. Enter the Topology ID. The graph that is displayed is filtered based upon the Topology ID. Check Select type of graph to enable the selection for the Unicast graph.
19-26
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 6 Step 7 Step 8 Step 9
Check the Unicast option. From the Anchor drop-down list, select a device. The selected device is the entry point for the graph. From the Destination drop-down list, select a device. The selected device is the destination for the graph. Click Fetch to view the graph.
Note
If the resulting graph does not trace the path from the source to the destination, then one of the following may be the cause:
Islands in the L2MP cloud. DCNM-LAN might not manage intermediate devices.
Multicast
A multicast graph displays the multicast traffic from a specified device to all hosts that are listening to a particular IGMP group. You can view the multicast information for a specific topology.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
Note
To see the names of topology toolbar icons, move the mouse pointer to the icon and wait briefly for the name of the icon to appear.
Step 2
Above the map, click L2 View. The dialog box appears in the Contents pane. In the dialog box, choose the Fabricpath view. Enter the Topology ID. The graph that is displayed is filtered based upon the Topology ID. Check Select type of graph to enable the selection for the Multicast graph. Check the Multicast option. From the Anchor drop-down list, choose a device. The selected device is the entry point for the graph. From the Graph ID drop-down list, choose an ID. The Graph ID is a forwarding tag for the graph. In the Source field, enter the multicast originating device. The multicast originating device is specified as an IP address or as * (wildcard). In the IGMP field, enter the IGMP group address.
19-27
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 11 Step 12
In the VLAN field, enter multicast-associated VLAN information. Click Fetch to view the graph.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. Above the map, click PortChannel and vPC. The map shows the PortChannel and vPC view of the topology. From the topology toolbar, choose the Press and hold the Shift key. Click the device that you want to use as a vPC peer switch. Right-click either device and choose Launch vPC Wizard. The vPC Creation Wizard dialog box appears. For more information about using this wizard, see the Interfaces Configuration Guide, Cisco DCNM for LAN, Release 5.x. icon.
Step 2
Click one device that you want to use as a vPC peer switch.
Managing a vPC
From the topology map, you can access the vPC feature for a specific vPC link.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. Above the map, click one of the following views:
Step 2
Step 3 Step 4
Find the vPC link for the vPC that you want to manage. Use the step that applies to the view that you selected:
19-28
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
PortChannel and vPCRight-click the ellipse on the vPC link and choose Manage vPC. Logical vPC ViewRight-click the vPC link and choose Manage vPC.
The vPC feature appears. The vPC that you want to manage is selected in the summary table. For more information about the vPC feature, see the Interfaces Configuration Guide, Cisco DCNM for LAN, Release 5.x.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. Above the map, click one of the following views:
Step 2
Step 3
Find the vPC for which you want to resolve configuration inconsistencies. If a vPC link has configuration inconsistencies, a red ellipse appears over the link. If you use the PortChannel and vPC view, vPC peer links with configuration inconsistencies also show a red ellipse.
Step 4
(Optional) If you want to resolve configuration inconsistencies now, do one of the following:
To resolve configuration inconsistencies for the vPC link and the vPC peer link, right-click the red ellipse on the vPC link and choose Launch Configuration Consistency. To resolve configuration inconsistencies for the vPC peer link only, right-click the red ellipse on the vPC link and choose Launch Configuration Consistency.
The Resolve Configuration Inconsistency dialog box opens. For more information about using the Resolve Configuration Inconsistencies dialog box, see the Interfaces Configuration Guide, Cisco DCNM for LAN, Release 5.x.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. The topology toolbar appears on the left side of the topology map.
19-29
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 2
Right-click on the switch and then choose Show End Devices. The Contents pane displays all the servers that are connected to the switch. It displays only the pWWN of the servers because the IP address is not available as a part of the enode information in FIP snooping.
From the Feature Selector pane, choose Topology > Topology View. The topology map appears in the Contents pane. Above the map, click L2 View. The dialog box appears in the Contents pane. In the dialog box, click VSAN. Enter the range to search (valid values are between 1 and 4094). Check View mapped VLANs to view the VLANs. Click Fetch.
Step 2
Related Documents
For additional information related to the topology map, see the following sections: Related Topic VDCs vPCs Configuring LLDP on managed devices Device discovery Device groups Network servers Document Title Virtual Device Context Configuration Guide, Cisco DCNM for LAN, Release 5.x Interfaces Configuration Guide, Cisco DCNM for LAN, Release 5.x System Management Configuration Guide, Cisco DCNM for LAN, Release 5.x Chapter 16, Administering Device Discovery Chapter 21, Configuring Device Groups Chapter 20, Configuring Network Servers
19-30
OL-25174-02OL-25174-02
Chapter 19
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Feature Name Common topology Network servers DCNM-SAN support Device groups VSAN Overlay
Feature Information Support for SAN devices and connections was added. Support for showing network servers was added. Support for launching the Cisco DCNM-SAN client was added. Support for device groups was added. Support for VSAN overlay was added as a part of the L2 view. Support for discovering servers that are either directly connected to Cisco Nexus 5000 Series switches or CNAs. Support for FabricPath was added. Support for Datacenter Grouping was added.
Discovery of servers connected to Cisco Nexus 5.1(0) 5000 series switches via CNAs FabricPath support Datacenter Grouping 5.1(0) 6.0
19-31
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
19-32
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
20
Information About Network Servers, page 20-1 Licensing Requirements for Network Servers, page 20-2 Prerequisites for Network Servers, page 20-3 Guidelines and Limitations for Network Servers, page 20-3 Configuring Network Servers, page 20-3 Viewing Server Connectivity Information, page 20-11 The Total Number Server Adapters label displays the number of servers available in network., page 20-12 Additional References, page 20-16 Feature History for Network Servers, page 20-17
Servers having Converged Network Adapters (CNAs) that are directly connected to Cisco Nexus 5000 Series switches. Servers having CNAs that are connected to a Nexus 2000 which is in turn connected to Nexus 5000 Series switch. Servers having CNAs that are directly connected to Nexus 7000 Series switch.
20-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
Because LLDP is not supported on Nexus 2000 Series switches that are connected to Nexus 7000 Series switches, Cisco DCNM-LAN cannot discover servers having CNAs connected to Nexus 2000 Series switches which are in turn connected to Nexus 7000 Series switches. You can see the discovered CNA adapters in the Static Server-Adapter Mapping feature pane. DCNM-LAN does not allow you to automatically correlate adapters that are connected to Cisco Nexus 5000 Series switches via CNA. However, you can manually correlate the CNA adapters that belong to a network server. For more information about the discovery process, see Chapter 16, Administering Device Discovery. The Network Servers feature allows you to associate HBAs and Ethernet network adapters that DCNM-LAN discovered with LLDP to servers. The topology map can show the network servers that you define.
Note
DCNM-LAN supports discovery and management of VMware ESX servers (including the virtual machines that are hosted on the ESX servers), Linux servers, and Windows 2008 servers only. The Network Servers feature also allows you to view server connectivity information.
20-2
OL-25174-02OL-25174-02
Chapter 20
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
License Requirement Network Servers requires no license. Any feature not included in a license package is bundled with the Cisco DCNM-LAN and is provided at no charge to you. For information about obtaining and installing a Cisco DCNM LAN Enterprise license, see the Cisco DCNM Installation and Licensing Guide, Release 5.x.
LLDP must be enabled on network servers. DCNM-LAN must have discovered the network adapters of a server before you can use the Network Servers feature to correlate adapters automatically or bind them manually to a server.
DCNM-LAN can discover the network servers that run a Linux operating system. DCNM-LAN can automatically correlate the network servers for HBA ports that are manufactured by Emulex or Qlogic only. DCNM-LAN can automatically correlate the adapters on the Linux operating system and ESX servers only. DCNM-LAN supports CNAs that are manufactured by Emulex or Qlogic only. Because the CNA does not advertise the IP address of the server, you must manually correlate one CNA before you can trigger the automatic correlation of subsequent entries.
Configuring Default Server Credentials, page 20-4 Clearing Default Server Credentials, page 20-4 Configuring Unique Credentials for a Server, page 20-5 Clearing Unique Credentials for a Server, page 20-6 Correlating Servers, page 20-6 Correlating a Server to Adapters Automatically, page 20-9 Binding Adapters to a Server Manually, page 20-10 Unbinding an Adapter from a Server, page 20-10
20-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
Note
We recommend that you use a strong password. Common guidelines for strong passwords include a minimum password length of eight characters and at least one letter, one number, and one symbol. For example, the password Re1Ax@h0m3 has ten characters and contains uppercase and lowercase letters in addition to one symbol and three numbers.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Servers > Server Credentials. The Server Credentials area appears in the Contents pane, above the Servers area, which lists the discovered servers.
In the User Name field, enter the username for the default server credentials. A valid username can be 1 to 32 characters. Valid characters are numbers, symbols, and case-sensitive letters. To the right of the Password field, click the down-arrow button. In the Password field and the Confirm Password field, enter the password for the default credentials. Valid passwords are numbers, symbols, and case-sensitive letters. Click OK. From the menu bar, choose File > Deploy to save the default credentials.
Note
If you clear the default server credentials, DCNM-LAN can connect to discovered servers only if you have configured unique credentials for each managed server.
20-4
OL-25174-02OL-25174-02
Chapter 20
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
BEFORE YOU BEGIN
If you intend to use DCNM-LAN without default server credentials, you should ensure that DCNM-LAN is configured with unique server credentials for each discovered server before you perform this procedure. For more information, see the Configuring Unique Credentials for a Server section on page 20-5.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Servers > Server Credentials. The Server Credentials area appears in the Contents pane, above the Servers area, which lists the discovered servers.
Step 2
In the Default Credentials area, click Clear. The User Name field and the Password field clear. From the menu bar, choose File > Deploy to save your changes to the DCNM-LAN server.
Step 3
Note
Note
We recommend that you use a strong password. Common guidelines for strong passwords include a minimum password length of eight characters and at least one letter, one number, and one symbol. For example, the password Re1Ax@h0m3 has ten characters and contains uppercase and lowercase letters in addition to one symbol and three numbers.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Servers > Server Credentials. The discovered servers appear in the Servers area of the Contents pane. In the User Credentials column for the server, double-click the entry and then click the down-arrow button. In the User Name field, enter the username. Valid usernames are between 1 and 32 characters. Valid characters are numbers, symbols, and case-sensitive letters. In the Password field and the Confirm Password field, enter the password. Valid passwords are numbers, symbols, and case-sensitive letters.
20-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 5 Step 6
Click OK. From the menu bar, choose File > Deploy to save the server credentials to the DCNM-LAN server.
Note
If you clear the unique credentials for a discovered server, DCNM-LAN uses the default credentials to connect to the server.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Servers > Server Credentials. Discovered servers appear in the Servers area of the Contents pane. In the Servers area, click the server that has credentials that you want to clear. From the menu bar, choose Actions > Clear Credentials. A confirmation dialog box appears. Click Yes. From the menu bar, choose File > Deploy to save your changes to the DCNM-LAN server.
Step 2 Step 3
Step 4 Step 5
Correlating Servers
Correlating servers helps you manage a range of servers. An operation performed on a range of servers applies the operation to all the servers in that range.
20-6
OL-25174-02OL-25174-02
Chapter 20
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
NICs have been identified.
To verify that the NICs have been identified, you can use the iponfig /all CLI command.
HBAs have been identified.
To verify that the HBAs have been identified, you can use the winrm e wmi/root/wmi/MSFC_FibrePortHBAAttributes CLI command.
Note
Command output may display an error if an HBA is not installed on the server. This is expected. Ignore the error.
To verify that the NICs have been identified, you can use the iponfig /all CLI command.
HBAs have been identified.
To verify that the HBAs have been identified, you can use the winrm e wmi/root/wmi/MSFC_FibrePortHBAAttributes CLI command.
Note
Command output may display an error if an HBA is not installed on the server. This is expected. Ignore the error.
For RHEL:
RHEL 4.5 is supported. SSH is enabled. User level privileges are enabled. NICs have been identified.
To verify that the NICs have been identified, you can use the ifconfig -a CLI command.
HBAs have been identified.
To verify that Qlogic HBAs have been identified, you can use the grep adapter-port /proc/scsi/qla2xxx/* CLI command. To verify that Emulex HBAs have been identified, you can use the find /sys/class/scsi_host/ -name port_name and the find /sys/class/fc_host/ -name port_name CLI commands. View the consolidated information by using cat on the resulting files.
To verify that the NICs have been identified, you can use the esxcfg-nics -l CLI command.
20-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
HBAs have been identified.
To verify that the HBAs have been identified, you can use the esxcfg-scsidevs -a CLI command.
HBAs and CNAs of Qlogic and Emulex have been tested and supported.
Note
For a virtual machine, the HBA information is not displayed in the virtual machine. In the virtual machine display, the SAN details are disabled for the virtual machine. The HBA information is displayed in the ESX. Device version support:
For Nexus 7000, LLDP is supported from 5.0. For Nexus 5000, LLDP is supported from4.2(1)N1(1). For Nexus 5000, FC is supported for all versions. For MDS, is supported from 3.3(2).
Windows Server 2003 Supported NIC All Supported HBA Supported CNA Operating System Required service Authority Qlogic, Emulex Qlogic, Emulex R2 (All editions) 32 bit and 64 bit Telnet/ssh WinRM User level privileges
Windows Server 2008 All Qlogic, Emulex Qlogic, Emulex All editions 32 bit and 64 bit Telnet/ssh WinRM User level privileges
RHEL All Qlogic, Emulex Qlogic, Emulex RHEL 4.5 SSH/Telnet User level privileges
ESX All Qlogic, Emulex Qlogic, Emulex ESX 3.5 SSH/Telnet User level privileges
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Servers > Server Credentials. The discovered servers appear in the Servers area of the Contents pane. In the Servers pane, right-click to access the context menu. Choose New Server in the context menu. A new row for the server is displayed. In the IP Address field, enter the IP addresses of the range of servers. IP address are delimited with commas or hyphens. After the IP addresses are entered, the system validates the addresses. A red colored border indicates an error condition. A yellow colored border indicates a valid entry. Double-click the User Credentials field to access the Set User Credentials dialog box.
Step 5
20-8
OL-25174-02OL-25174-02
Chapter 20
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 6 Step 7 Step 8 Step 9 Step 10 Step 11
In the User Name field, enter the username. Valid usernames are between 1 and 32 characters. Valid characters are numbers, symbols, and case-sensitive letters. In the Password field and the Confirm Password field, enter the password. Valid passwords are numbers, symbols, and case-sensitive letters. Click OK. From the menu bar, choose File > Deploy to save the settings to the DCNM-LAN server. To start server correlation, right-click the row or a single server in the range to access the context menu. Choose Correlate in the context menu. The operation changes the status of each server to Discovering. When the operation completes, the adapters are bound to the servers. If the operation fails, the status of the server becomes Unreachable and is accompanied with a message.
Note
If the server credentials are unavailable, you can bind the adapter to a server manually. For more information, see the Binding Adapters to a Server Manually section on page 20-10. DCNM-LAN must have discovered one or more HBA network adapters and one network server.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Servers > Servers. Discovered servers appear in the Servers area of the Summary pane. Under the Server column, click the server that you want to correlate with adapters automatically.
Step 2
Tip
If you want to correlate more than one server at a time, press and hold Ctrl and then click each server that you want to correlate with adapters.
Step 3
Right-click on the selected server(s) and choose Correlate Server(s). DCNM-LAN begins discovering network connectivity information from the selected server(s).
20-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
After discovery completes, the Connected Switches column shows any additional connections correlated to the server. The local topology shown to the right of the selected server is also updated to show any connections correlated with the server.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Servers > Static Server-Adapter Mapping. The Contents pane lists discovered HBA network adapters. Press and hold the Ctrl key and then click each adapter that you want to bind to a server. Right-click on any selected adapter and choose Bind to Server. The Enter Server Name dialog box appears In the Server Name field, enter the IP address or DNS name of the server, and then click OK. From the menu bar, choose File > Deploy to save your changes to the DCNM-LAN server. In the topology map, the connection between the adapter and the managed device is available for viewing when you choose to view the connections to end devices for the managed device.
Step 2 Step 3
Step 4 Step 5
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Servers > Static Server-Adapter Mapping.
20-10
OL-25174-02OL-25174-02
Chapter 20
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The Contents pane lists discovered HBA network adapters.
Step 2 Step 3
Under the Server Port column, click the adapter that you want to unbind. Right-click the adapter and choose Unbind from Server. The Server Name field for the selected adapter clears. From the menu bar, choose File > Deploy to save your changes to the DCNM-LAN server. In the topology map, the connection between the adapter and the managed device is no longer available for viewing.
Step 4
From the Feature Selector pane, choose Network Servers > Servers. The Summary pane lists discovered servers. In the Summary pane, click the server whose network connectivity information you want to view. The local topology for the server appears to the right of the Summary pane. (Optional) If you want to view Ethernet network or storage area network connectivity for the server, on the Server Details tab, expand the LAN Connectivity or SAN Connectivity section, as needed.
Step 2
Step 3
Note
The DCNM-LAN Client tracks only directly connected hosts to the discovered switches.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Server > End Hosts. The End Hosts summary appears in the Contents pane. The End Hosts summary displays the details of the network servers that are connected to the Cisco NX-OS devices. The information about the End Hosts is listed below.
20-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Column Server IP Address Switch Port VLAN ID Switch Name Last Seen Time Description IP address of the server. Port details. VLAN ID. Name of the switch. Capability Read Read Read Read
Displays the last seen time of Read the servers MAC address in the switch.
The Total Number Server Adapters label displays the number of servers available in network. Select the Enable End Hosts Discovery checkbox and click the deploy buttin to enable end hosts discovery. By default, the end host discovery is disabled. When you select enable end hosts discovery, end host discovery is executed every three hours for the following Cisco Nexus devices supported by Cisco DCNM:
The Current Page/Total Number of Pages label displays the current page and total count of pages.
Step 2 Step 3 Step 4 Step 5
From the Switch Port column, click on a port to navigate to the Ports panel and configure the port. (Optional) Click the first, previous, next, or the last button pages. (Optional) Enter the page number that you want to view in the Go to Page to navigate through the field.
(Optional) Click the Excel icon to export the data in a Microsoft Excel spreadsheet. You can chose to export either all server details or only the visible rows. When you see the prompt Do you want to export the all the servers?, click No to export only visible rows. (Optional) In the Filter By drop-down list, select the MAC address, Switch IP address, connected switch IP address, or VLAN ID and then click the magnifying glass to search the network server. (Optional) Select inactive hosts since from the drop-down list and provide the required date. All the inactive hosts from the date entered to the current date will be displayed.
Step 6 Step 7
Note
Once you filter the inactive servers, any of the inactive servers that becomes active in the switch will be removed from the filtered list. You can use the delete button to delete inactive servers. (Optional) You can change the polling interval by performing the following steps:
a.
Step 8
Under<USER_INSTALL_DIR>\dcm\ dcnm\data\hosttracking, locate the hosttracking.properties file. In the hosttracking.properties file, under the host_discovery_polling_interval_in_minutes field, enter the polling interval (in minutes).
Note
If Cisco DCNM is installed in VSB, by default, the hosttracking.properties file is located under /root/CSCOdcnm/data_archive/data/hosttracking. For example, HOST_DISCOVERY_POLLING_INTERVAL_IN_MINUTES=180
20-12
OL-25174-02OL-25174-02
Chapter 20
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
b.
For the new polling interval to be in effect, in the End Hosts Discovery screen, disable end hosts discovery and enable end hosts discovery again with the new polling interval.
After you apply the filters in the End Hosts summary, any addition and deletion of network servers within the network are not displayed in the filtered list. To see those changes, you must either remove the filter and reapply or refresh the window. If the filtered result size exceeds the maximum number of sever rows per page, a dialog box appears warning you to change the filter criteria so that the number of rows is less than the maximum number of rows allowed per page.
DETAILED STEPS
Step 1
From the main menu bar, Admin > Data Sources > VMware.
You can discover a Cisco Nexus device by using the Cisco DCNM Web Client.
DETAILED STEPS
Step 1
From the main menu bar, Admin > Data Sources > LAN.
If a switch port that is connected to the server is down, the Cisco DCNM server removes that server entry from End Host page. If a switch port that is connected to the server is up, the DCNM server automatically detects the port and then triggers the server discovery and populates the MAC address table. The switch MAC address table does not have any host MAC addresses in the following scenarios:
To track the hosts connected to the Switch, use the show mac address-table command.
Field Descriptions for Servers, page 20-14 Servers Summary Pane, page 20-14 Field Descriptions for Server Credentials, page 20-16
20-13
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Servers Summary Pane, page 20-14 Server: Server Details: LAN Connectivity Section, page 20-14 Server: Server Details: LAN Connectivity Section, page 20-14
Description Display only. DNS name or IP address of the server. If DCNM-LAN could not determine the DNS name of the server, the IP address is shown instead. Display only. Name and IP address of each discovered device that is connected to the server. Display only. Whether the DCNM-LAN server can connect to and log into the server. Valid values are as follows:
ManagedDCNM-LAN has successfully logged into the server during automatic correlation of the server adapters. UnmanagedDCNM-LAN has not attempted to log into the server yet. By default, a discovered server is unmanaged until you attempt to correlate its adapters automatically. UnreachableDuring automatic correlation of the server adapters, DCNM-LAN could not reach the server or authentication failed. A message indicates the reason for the status.
Field
Switch
Description Display only. Name and IP address of devices that the server is connected to with an Ethernet connection. Display only. Name of the Ethernet interface on the device, such as Ethernet1/2. Display only. MAC address of the Ethernet adapter on the server that is connected to the device. Display only. Name of the interface on the server.
20-14
OL-25174-02OL-25174-02
Chapter 20
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Field
Switch
Description Display only. Name and IP address of devices that the server is connected to with a Fibre Channel connection. Display only. World Wide Name (WWN) of the Fibre Channel interface on the device. Display only. Name of the Fibre Channel interface on the device, such as Fc1/4. Display only. World Wide Name of the HBA interface on the server.
FC Port WWN
Description Display only. Identifies the server adapter, depending upon the adapter type, as follows:
For an HBA adapter, this field displays the WWN assigned to the adapter. For an Ethernet adapter, this field displays the MAC address of the adapter. Ethernet adapters appear on the Static Server-Adapter Mapping contents pane when the server does not advertise the IP address of the adapter in LLDP.
DNS name or IP address of the network server that the adapter is bound to. Display only. Name of the manufacturer of the adapter. Display only. Name and WWN of the Fibre Channel interface on the connected device. Display only. Name and IP address of the connected device.
20-15
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Field
Default Credentials
Description Name of the server user account that the DCNM-LAN server uses to access servers that it is discovering or that it is managing. On the server, the user account must have adequate permissions to retrieve information about the server network adapters.
Note
User Name
The information in the User Credentials field in the Servers area overrides the information in the Default Credentials section.
Password
Servers
Password for the server user account specified in the User Name field. By default, this field is blank. Display only. IPv4 address of the server. Display only. Name of the server. If DCNM-LAN cannot determine the name of the server, the IP address of the server is shown. Server user account that DCNM-LAN uses to connect to the server.
Note
If you configure this field, DCNM-LAN uses the user account that you configure when it connects to the server. If this field is blank, DCNM-LAN uses the user account specified in the Default Credentials area. By default, this field is blank.
Status
Display only. Whether the DCNM-LAN server can connect to and log into the server. Valid values are as follows:
ManagedDCNM-LAN has successfully logged into the server during automatic correlation of the server adapters. UnmanagedDCNM-LAN has not attempted to log into the server yet. By default, a discovered server is unmanaged until you attempt to correlate its adapters automatically. UnreachableDuring automatic correlation of the server adapters, DCNM-LAN could not reach the server or authentication failed. A message indicates the reason for the status.
Additional References
For additional information related to administering Network Servers, see the following sections:
20-16
OL-25174-02OL-25174-02
Chapter 20
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Related Documents
Related Topic Device discovery Topology map Document Title Chapter 16, Administering Device Discovery Chapter 19, Working with Topology
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Releases 5.0(2)
20-17
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
20-18
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
21
Information About Device Groups, page 21-1 Licensing Requirements for Device Groups, page 21-2 Prerequisites for Device Groups, page 21-2 Guidelines and Limitations for Device Groups, page 21-2 Configuring Device Groups, page 21-2 Where to Go Next, page 21-6 Field Descriptions for Device Groups, page 21-6 Additional References, page 21-7 Feature History for Device Groups, page 21-8
LocationYou could group devices based on their physical location, such as city or as specific as the data center rack designation. AdministratorYou could group devices based on the DCNM-LAN users who administer them. Data center architectureYou could group devices based on the layers of network architecture in your data center, such as aggregation, access, and storage layers. Device typeYou could group devices based on their type, such as Cisco Nexus 7000 Series switches versus Cisco Nexus 5000 Series switches.
A device can be a member of one group only. The default device group contains any devices that you have not assigned to a custom device group. Any newly discovered device is placed in the default group.
21-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Devices must be discovered before you can assign them to device groups.
By default, all discovered devices belong to the default device group. A device can be a member of one group only. For physical devices that support virtual device contexts (VDCs), you can assign VDCs that exist on the same physical device to different device groups. Choose a method of categorizing devices into device groups that provides the best simplification of your network topology.
Creating a Device Group, page 21-2 Adding Devices to a Group, page 21-4 Removing Devices from a Group, page 21-5 Deleting a Device Group, page 21-5
21-2
OL-25174-02OL-25174-02
Chapter 21
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Device Groups. The Summary pane lists custom device groups, if any. The default group does not appear. The Details pane shows the group name, description, and a list of devices in the group. From the menu bar, choose Actions > Create Device Group. A blank row appears in the Summary table. In the blank row, under Device Group Name, enter a name for the group. (Optional) Under Description, enter a useful description of the group. In the Details pane, expand the Membership Details section, if necessary. To add devices to the group, do the following:
a.
Step 2
Right-click below the column names in the Membership Details section and choose Add Device. The Device Selection dialog box appears. (Optional) Use the Select Search Criteria drop-down list to filter the devices shown in the Available Devices list. You can filter devices in one of the following ways:
All devicesShows every discovered device. Device typeShows only discovered devices of the type that you choose, such as Cisco Nexus
b.
monitor.
Connected devicesShows discovered devices connected within the number of hops that you
Move one or more devices from the Available Devices List to the Selected Devices list. To move one device, click the device and then click Add. To move more than one device, press and hold Ctrl, click each device, and then click Add. Click OK.
d. Step 7
From the menu bar, choose File > Deploy to save the device group configuration. The new group is available in the topology map. Each device that you added to the new device group is removed from its previous group. If a preexisting, nondefault device group became empty because you moved all its devices to the new device group, DCNM-LAN automatically deletes the empty device group.
21-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Device Groups. The Summary pane lists custom device groups. The default group does not appear. The Details pane shows the group name, description, and a list of devices in the group. Click the device group to which you want to add one or more devices. In the Details pane, expand the Membership Details section, if necessary. To add devices to the group, do the following:
a.
Right-click below the column names in the Membership Details section and choose Add Device. The Device Selection dialog box appears. (Optional) Use the Select Search Criteria drop-down list to filter the devices shown in the Available Devices list. You can filter devices in one of the following ways:
All devicesShows every discovered device. Device typeShows only discovered devices of the type that you choose, such as Cisco Nexus
b.
monitor.
Connected devicesShows discovered devices connected within the number of hops that you
Move one or more devices from the Available Devices List to the Selected Devices list. To move one device, click the device and then click Add. To move more than one device, press and hold Ctrl, click each device, and then click Add. Click OK.
d. Step 5
From the menu bar, choose File > Deploy to save the device group configuration. On the topology map, the device group will include the devices that you added to it.
21-4
OL-25174-02OL-25174-02
Chapter 21
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Each device that you added to the device group is removed from its previous group. If a preexisting, nondefault device group became empty because you moved all its devices to the new device group, DCNM-LAN automatically deletes the empty device group.
Tip
If you want to move devices from one group to another, add them to the other group. DCNM-LAN automatically removes devices from one group when you add them to another group.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Device Groups. The Summary pane lists custom device groups. The default group does not appear. The Details pane shows the group name, description, and a list of devices in the group. Click the device group from which you want to remove one or more devices. In the Details pane, expand the Membership Details section, if necessary. In the Membership Details section, select the devices that you want to delete. To select a single device, click the device. To select more than one device, press and hold Ctrl, and then click each device. Right-click on one of the selected devices and choose Delete. DCNM-LAN removes the selected devices from the device group. From the menu bar, choose File > Deploy to save the device group configuration. On the topology map, the default device group will include the devices that you deleted from the custom device group. Each device that you deleted from the custom device group is added to the default device group. If the custom device group became empty because you removed all its devices, DCNM-LAN automatically deletes the empty device group.
Step 5
Step 6
21-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Tip
If you add all the devices of a custom device group to another custom device group, DCNM-LAN automatically deletes the empty device group.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Device Groups. The Summary pane lists custom device groups. The default group does not appear. The Details pane shows the group name, description, and a list of devices in the group. Click the device group that you want to delete. From the menu bar, choose Actions > Delete Device Group. DCNM-LAN removes the device group from the Summary pane. The devices that were in the deleted device group are now members of the default device group.
Step 2 Step 3
Step 4
From the menu bar, choose File > Deploy to save the device group configuration. On the topology map, the default device group will include the devices that were in the deleted device group.
Where to Go Next
For more information about using device groups in the topology feature, see Chapter 19, Working with Topology.
Summary Pane, page 21-6 Device Group: Details: Global Settings Section, page 21-7 Device Group: Details: Membership Details Section, page 21-7
Summary Pane
Table 21-1 Device Groups Summary Pane
Description Display only. Name that you assigned to the device group. After you create a device group, the name is not editable. Device group names must start with a letter and can be up to 30 alphanumeric characters. Text describing the device group. A description can be up to 80 characters.
Description
21-6
OL-25174-02OL-25174-02
Chapter 21
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Description Display only. Name that you assigned to the device group. Text describing the device group. A description can be up to 80 characters.
Description Display only. Name of a device assigned to the device group. Display only. Name of the physical or virtual device type, such as Cisco Nexus 1000V Series or Cisco Nexus 7000 Series.
Additional References
For additional information related to administering Device Groups, see the following sections:
Related Documents
Related Topic Topology Device discovery Document Title Chapter 19, Working with Topology Chapter 16, Administering Device Discovery
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
21-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Releases 5.0(2)
21-8
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
22
Information About Cluster Administration, page 22-1 Licensing Requirements for Cluster Administration, page 22-4 Prerequisites for Cluster Administration, page 22-4 Guidelines and Limitations for Cluster Administration, page 22-4 Viewing Server Information, page 22-4 Field Descriptions for Cluster Administration, page 22-5 Additional References, page 22-6 Feature History for Cluster Administration, page 22-6
Cluster Administration, page 22-1 Clustered-Server Environment, page 22-2 Master Server Role, page 22-2 Distributed Server Tasks, page 22-2 Effect of Cluster Changes on Server Task Distribution, page 22-3
Cluster Administration
Cluster Administration allows you to view information about the DCNM-LAN servers configured to operate in a server cluster. If the DCNM-LAN server is not configured to operate in a cluster, the Cluster Administration feature allows you to view information about the single server. For each server that appears in the Cluster Administration summary pane, you can view information such as the DCNM-LAN release number, Java version, operating system, system threads, memory utilization, IP address, and disk drive usage.
22-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Clustered-Server Environment
You can deploy DCNM-LAN in a server cluster, with up to five DCNM-LAN servers in a clustser. DCNM-LAN servers in a cluster communicate using multicast IP messages. The primary benefit of a clustered-server deployment is enhanced capacity for the device-management tasks that DCNM-LAN performs. A clustered-server deployment also helps to ensure availability of the DCNM-LAN server. DCNM-LAN distributes tasks among all servers in the cluster. Servers in the cluster are always active and never in a stand-by mode. For information about the server-system and network requirements for a clustered-server deployment, and for the detailed steps for installing a server cluster, see the Cisco DCNM Installation and Licensing Guide, Release 5.x.
Auto-synchronization with devicesThe server regularly retrieves the system message log file from the device. For more information about auto-synchronization, see Chapter 23, Administering Auto-Synchronization with Devices. Statistical data collectionThe server runs any statistical data collectors for the device, with the exception of virtual port channel (vPC) statistics. The master server always runs statistical data collectors for vPC statistics. For more information about statistical data collection, see Chapter 25, Administering Statistical Data Collection. Device discoveryThe server performs device configuration discovery for the device; however, the remainder of the device discovery phases are performed by the master server. For more information about the phases of device discovery, see the Discovery Process section on page 16-3.
22-2
OL-25174-02OL-25174-02
Chapter 22
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
For example, if a user initiates device discovery for a switch named DC-NEXUS-7010-3, the master server completes the initial phases of device discovery. It then assigns the device configuration discovery phase for DC-NEXUS-7010-3 to one of the servers in the cluster, ensuring that discovery tasks are evenly distributed. After discovery completes, the master server assigns DC-NEXUS-7010-3 to the server that is managing the least number of devices. The master server instructs the assigned server to perform auto-synchronization for DC-NEXUS-7010-3. Whenever a DCNM-LAN client user starts a statistical chart for any managed feature on DC-NEXUS-7010-3, the master server instructs the assigned server to run the statistical data collector for the chart.
Cluster Behavior The server with the oldest start time becomes the master server and redistributes the assignment of managed devices evenly among the servers remaining in the cluster. Because the cluster size decreased, the number of devices assigned to each server increases. The master server redistributes the assignment of managed devices evenly among the servers remaining in the cluster. Because the cluster size decreased, the number of devices assigned to each server increases. If the user-initiated device-configuration deployment did not complete before the member server failed, the deployment fails and the server task to deploy the device configuration is lost. To recover from the loss of the deployment, the user must repeat the configuration steps and deploy the configuration again. In some cases, the failure may result in the device becoming unmanaged, and the user must rediscover the device before repeating the configuration steps. The master server redistributes the assignment of managed devices evenly among the servers remaining in the cluster. Because the cluster size decreased, the number of devices assigned to each server increases.
Server starts
The master server redistributes the assignment of managed devices evenly among the servers remaining in the cluster. Because the cluster size increased, the number of devices assigned to each server decreases.
22-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Servers in a cluster must meet the clustered-server requirements. For more information, see the Cisco DCNM Installation and Licensing Guide, Release 5.x.
The Cluster Administration feature shows information about running servers only. When a server in a cluster stops or fails, it appears to have left the cluster, and its information is not shown by the Cluster Administration feature.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Cluster Administration. The Summary pane displays the cluster by the partition name assigned to the cluster during installation. A single server environment still has a partition name assigned to it during installation.
Step 2
Expand the cluster. The Summary pane lists each DCNM-LAN server in the cluster with information about the server.
Tip Step 3
To update the server information, from the toolbar, choose View > Refresh.
(Optional) If you want to view disk usage information, on the Details tab, expand the Logical Disk(s) section.
22-4
OL-25174-02OL-25174-02
Chapter 22
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Summary Pane
Table 22-2 Cluster Administration Summary Pane
Field
Description
[Cluster partition name] Display only. Name assigned to the DCNM-LAN server partition during installation of the server software.
Note
The remaining fields on the summary pane pertain to specific servers in a cluster.
IP Address
Display only. IPv4 address of the DCNM-LAN server. If the server is currently the master server in the server cluster, the IP Address field also indicates that the server is the master server. Display only. DCNM-LAN release number that the server is running. Display only. Java version that the DCNM-LAN server is using. Display only. Number of processing threads used by the DCNM-LAN software on the server system. Display only. Percentage of system memory used by the DCNM-LAN software on the server system. Display only. Local date and time on the DCNM-LAN server when the client last received updated information.
DCNM-LAN Version Java Version Total Threads Memory Utilization (Percentage) Last Local Refresh Time
Field
General
Description
The fields in this section show the same information as the fields of the same name on the Summary pane.
Logical Disk(s)
Display only. Name of the drive. Display only. Total capacity of the drive, in megabytes. Display only. Number of megabytes available for use on the drive.
22-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Additional References
For additional information related to administering Cluster Administration, see the following sections:
Related Documents
Related Topic Events Device discovery Auto-synchronization with devices Statistical data collection Stopping servers Document Title System Management Configuration Guide, Cisco DCNM for LAN, Release 5.x Chapter 16, Administering Device Discovery Chapter 23, Administering Auto-Synchronization with Devices Chapter 25, Administering Statistical Data Collection Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Releases 5.0(2)
22-6
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
23
Information About Auto-Synchronization with Devices, page 23-1 Licensing Requirements for Auto-Synchronization with Devices, page 23-2 Prerequisites for Auto-Synchronization with Devices, page 23-2 Guidelines and Limitations for Auto-Synchronization with Devices, page 23-3 Configuring Device Auto-Synchronization, page 23-3 Viewing the Status of Auto-Synchronization Pollers, page 23-8 Field Descriptions for Auto Synchronization with Devices, page 23-9 Additional References, page 23-10 Feature History for Auto-Synchronization with Devices, page 23-11
23-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
This section includes the following topics:
Automatic and Manual Purging of Event Data, page 23-2 Virtualization Support, page 23-2
Days of the week and time of day that automatic purging occurs. Whether DCNM-LAN determines which event data to purge by the age of the data or by a maximum number of database entries. Severity level of events.
Virtualization Support
DCNM-LAN treats each virtual device context (VDC) on a Cisco NX-OS device as a separate device. DCNM-LAN creates one poller process per device.
The DCNM-LAN server must be able to connect to the devices. The Cisco NX-OS device must be running a supported version of Cisco NX-OS. The Cisco NX-OS device must have the minimal configuration that is required to enable device discovery to succeed. For more information, see the Verifying the Discovery Readiness of a Cisco NX-OS Device section on page 16-8.
23-2
OL-25174-02OL-25174-02
Chapter 23
Administering Auto-Synchronization with Devices Guidelines and Limitations for Auto-Synchronization with Devices
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
We recommend that you use the default device polling interval unless you encounter issues with synchronization due to slow responses from devices or to managing many devices. For more information, see the Configuring the Polling Interval section on page 23-4. For the Auto-Synchronization with Devices feature, the DCNM-LAN client does not automatically update the information shown in the Summary pane. To ensure that you are viewing current information, from the menu bar, choose View > Refresh. We recommend that you configure automatic purging of event data to ensure that the DCNM-LAN database size does not grow too large.
Starting and Stopping a Poller, page 23-3 Configuring the Polling Interval, page 23-4 Synchronizing with a Device, page 23-4 Deleting Data from the Events Database, page 23-5 Enabling and Disabling Automatic Event Purging, page 23-6 Configuring Automatic Event Purge Settings, page 23-6 Purging Events Now, page 23-8
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Auto Synchronization with Devices. A table of pollers appears in the Contents pane. Each row corresponds to a poller for a particular device. Devices are listed alphabetically. The Poller Status field displays messages about whether the poller is running or is stopped.
Step 2
23-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 3
To start a poller, from the menu bar, choose Actions > Start Poller. The Poller Status field changes to Running. To stop a poller, from the menu bar, choose Actions > Stop Poller. The Poller Status field changes to Stopped.
How often device configurations are changed by means other than DCNM-LAN, such as using the command-line interface of a device. If changes by means other than DCNM-LAN are common, consider using a short polling interval. How important it is to your organization that DCNM-LAN be up to date with managed device configurations. If up-to-date configuration information is important to your organization, consider using a short polling interval.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Auto Synchronization with Devices. The polling intervals for all devices appear below the table of pollers in the Poller Setting tab. Select the device in the Platform column that you want to work with. In the Polling Interval field, enter the number of seconds between auto-synchronizations for the selected device. The range of polling interval values is displayed when you begin editing the Polling Interval field for the device. From the menu bar, choose File > Deploy to save the polling interval.
Step 2 Step 3
Step 4
23-4
OL-25174-02OL-25174-02
Chapter 23
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
If many configuration changes have occurred on the device since the last successful synchronization, consider performing device discovery instead of synchronization. For more information, see the Discovering a Device section on page 17-4.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Auto Synchronization with Devices. A table of pollers appears in the Contents pane. Each row corresponds to a poller for a particular device. Devices are listed alphabetically.
Step 2 Step 3
Click to select the device that you want DCNM-LAN to synchronize with. From the menu bar, choose Actions > Synchronize with Device. Synchronization begins. To determine when the synchronization has finished, watch the Last Sync Status column. Typically, synchronization with a device occurs in less than 5 minutes. You do not need to save your changes.
Tip
If you want to delete events based on the number of events in the database, see the Purging Events Now section on page 23-8.
23-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Auto Synchronization with Devices. The Events Database Administration tab appears in the Details pane, below the table of pollers. From the Delete events older than drop-down list, choose the date and time of the newest event that you want to delete and click OK. Click Delete. DCNM-LAN deletes all events older than the date and time that you specified.
Step 2 Step 3
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Auto Synchronization with Devices. The Events Database Administration tab appears in the Details pane, below the table of pollers. Under Auto Purge Settings, do one of the following:
Step 2
To enable automatic event purging, check Enable Auto Purge. To disable automatic event purging, uncheck Enable Auto Purge.
Step 3
From the menu bar, choose File > Deploy to save your changes to the DCNM-LAN server.
23-6
OL-25174-02OL-25174-02
Chapter 23
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Determine what criteria you want DCNM-LAN to use to determine which events to purge. The criteria available are as follows:
Age of eventDCNM-LAN can purge all events that are older than a specific number of days, weeks, or months. Number of events in the databaseWhen the number of events in the database exceeds the maximum number that you specify, DCNM-LAN can purge the oldest events first until the maximum number is not exceeded. Severity of eventDCNM-LAN can purge events based on the severity level of the event.
If you enable both criteria, DCNM-LAN applies them independently of each other.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Auto Synchronization with Devices. The Events Database Administration tab appears in the Details pane, below the table of pollers. Under Purge Threshold, configure the criteria that DCNM-LAN uses to determine which events to purge. You can configure any of the criteria in the following table: Purge Criteria Age of events How to Configure
1. 2. 3.
Step 2
Check Data older than. From the first drop-down list, choose the number of days, weeks, or months. From the second drop-down list, choose Days, Weeks, or Months, as needed. Check Total Entries Exceed(0-2147483647). In the box, enter the maximum number of entries that you want to allow in the events database. Check Severity. The list of eight severity levels becomes available. For each severity level that you want DCNM-LAN to use to determine whether to purge events, check the severity level.
1. 2.
Severity of event
1. 2.
Step 3
Under Auto Purge Settings, follow these steps to configure when you want automatic purging to occur:
a. b.
Check the days-of-the-week check boxes to specify which days of the week that you want automatic purging to occur. Use the Run at box to configure the exact time on the specified days that you want automatic event purging to occur.
Step 4 Step 5
(Optional) If you want to enable automatic event purging, check Enable Auto Purge. From the menu bar, choose File > Deploy to save your changes to the DCNM-LAN server.
23-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Tip
If you want to delete events on demand, based on the exact age of the events, see the Deleting Data from the Events Database section on page 23-5.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Auto Synchronization with Devices. The Events Database Administration tab appears in the Details pane, below the table of pollers. Under Purge, click Purge Now. DCNM-LAN deletes events, using the automatic event purge settings to determine which events to purge.
Step 2
Field
Pollers
Description Display only. Date and time that the DCNM-LAN client updated information shown on the Contents pane. Display only. Name and IP address of the device for the corresponding poller. Display only. Whether the poller is running or stopped. A running poller attempts to synchronize with the configuration and status information from its device at the frequency specified by the Device Polling Interval field. Display only. Date and time that the poller last retrieved system and accounting log data from the device.
23-8
OL-25174-02OL-25174-02
Chapter 23
Administering Auto-Synchronization with Devices Field Descriptions for Auto Synchronization with Devices
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 23-1 Auto Synchronization Pollers Information (continued)
Description Display only. Whether the most recent synchronization attempt succeeded or failed. If synchronization failed, determine why DCNM-LAN failed to connect to the device. If necessary, rediscover the device.
Poller Setting Tab, page 23-9 Events Database Administration Tab, page 23-9
Field
Pollers
Description Number of seconds that all pollers wait before the next attempt to synchronize with a device. The range of polling interval values is displayed when you begin editing the Polling Interval field for the device. Display only. Name and IP address of the device for the corresponding poller.
Polling Interval
Device
Field
Description
Delete events older than Date and time of the newest event to be deleted from the events database. There is no default value for this field.
Purge Threshold
Whether, during automatic event purging, DCNM-LAN deletes events that are older than the age specified in the drop-down lists located to the right of this check box. By default, this check box is unchecked. If you check the check box, the default age is 1 day. Whether, during automatic event purging, DCNM-LAN deletes the oldest events until the number of events equals the number in the box located to the right of this check box. By default, this check box is unchecked. If you check the check box, the default number of event is 25,000. Whether, during automatic event purging, DCNM-LAN deletes events with severity levels that are selected from the list of severity levels. By default, this check box is disabled.
Severity
23-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 23-3 Events Database Administration Tab (continued)
Description Severity levels of events that DCNM-LAN deletes during automatic event purging. The severity levels are available only if the Severity check box is checked. By default, all severity levels are disabled. The severity levels are as follows:
Whether automatic purging of event data is enabled. By default, this check box is disabled. Days of the week that the automatic purging of events data occurs. By default, none of the check boxes are checked. If you check the Daily check box, the check boxes for the individual days of the week become unavailable. Time of day that automatic purging of event data occurs, on the days of the week that automatic purging is enabled.
Run at
Additional References
For additional information related to administering Auto-Synchronization with Devices, see the following sections:
Related Documents
Related Topic Events Device discovery Document Title System Management Configuration Guide, Cisco DCNM for LAN, Release 5.x Chapter 16, Administering Device Discovery
23-10
OL-25174-02OL-25174-02
Chapter 23
Administering Auto-Synchronization with Devices Feature History for Auto-Synchronization with Devices
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Releases 5.0(2)
23-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
23-12
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
24
Information About Threshold Rules, page 24-1 Licensing Requirements for Threshold Rules, page 24-5 Configuring Threshold Rules, page 24-5 Additional References, page 24-8 Feature History for Threshold Rules, page 24-9
Threshold Rules Overview, page 24-1 Threshold Rule Examples, page 24-2
Rising Threshold, page 24-2 Falling Threshold, page 24-2 Threshold Rule Properties, page 24-2 Threshold Rule Actions, page 24-2
24-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Rising Threshold
The rising threshold is the upper threshold for a sample variable. When the current sampled variable is greater than or equal to the specified threshold, a set of actions is performed.
Falling Threshold
The falling threshold is the lower threshold for a sample variable. When the current sampled variable is lower than or equal to the specified threshold a set of actions is performed.
Note
You can specify only one rising threshold and one falling threshold for a single sampled variable.
NameSpecifies the threshold rule name. FrequencySpecifies the number of times the sampled variable must cross a threshold before triggering any actions. PeriodSpecifies the interval of time the frequency is monitored. RepeatPrevents the timer from resetting after triggering an action within the period. TrendSpecifies the rising or falling threshold.
Send an email or SMS to a mail server or mail to SMS gateway. Run a script on the server. Send an event to the current DCNM JMS channel.
The granularity of a period is driven by the minimal interval of the collected data. Consequently, the period must be higher than that interval. This section includes the following topics:
Triggering an Action Each Time a Threshold is Crossed, page 24-2 Triggering an Action Only Once in a Period When a Threshold is Crossed, page 24-3 Triggering an Action Every Fourth Period When a Threshold is Crossed, page 24-4
24-2
OL-25174-02
Chapter 24
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Frequency1 RepeatYes
Figure 24-1 shows the trigger action when you set rule properties to the preceding values.
Figure 24-1 Trigger an Action Each Time a Threshold is Crossed
If the sampled variable crosses the threshold, an action is taken the first time it crosses the threshold. As a result, an action is performed each time the threshold is crossed.
Figure 24-2 shows the trigger action when you set rule properties to the preceding values.
24-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Figure 24-2 Trigger an Action Only Once When a Threshold is Crossed Within a Period
If the sampled variable crosses the threshold, an action is taken the first time it crosses the threshold. For the remaining 5 minutes, an action will not be taken. As a result, an action is performed only once during the specified period.
Figure 24-3 shows the trigger action when you set rule properties to the preceding values.
Figure 24-3 Trigger an Action Every Fourth Period When a Threshold is Crossed
If the sampled variable crosses the threshold, an action is taken the fourth time it crosses the threshold. For the remaining 5 minutes, an action is not taken. As a result, an action is performed only once during the specified period.
24-4
OL-25174-02
Chapter 24
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Creating Threshold Rules, page 24-5 Deleting Threshold Rules, page 24-7 Editing Threshold Rules, page 24-7 Viewing Threshold Rules, page 24-8 Applying a Threshold Rule to a Chart, page 24-8
DETAILED STEPS
Step 1 Step 2
From the Feature Selector pane, choose DCNM Server Administration > Threshold Rules. From the toolbar, choose New, and then choose New Threshold Rule. The Details and Threshold Bindings tabs appear in the Details pane, with the Details tab open. Create a threshold rule as follows:
a. b.
Step 3
In the Name field, enter a name. In the Description field, enter a description of the threshold rule. After you have enter a description, the Rising Threshold check box is automatically checked and the Threshold field in the Settings area is outlined in red.
Note
A field outlined in red indicates that an entry is required. A field outlined in yellow indicates that the entry is satisfactory.
c.
In the Settings area, enter a value in the Threshold field. Once you have entered a value, the three options in the Action area are outlined in red. In the Action area, provide one of the following:
d.
24-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Enter email addresses (delimited with commas) Select Sent Event to forward events to the DCNM-LAN Event Browser Enter a script name
The script receives all data regarding the crossed threshold. The script can be written in any programming language and saved in one of the directories of the system PATH. Table 24-1 describes the available parameters.
Table 24-1 Parameters Passed to Script
Parameter $1 $2 $3 $4 $5
Description Device name Threshold name Timestamp Severity Monitored metric that is a counter or a non-counter.
When used as a counter, it represents a rate in metric units /second. When used as a non-counter, it represents an absolute in metric units.
$6
When used as a counter, it represents a rate in metric units /second. When used as a non-counter, it represents an absolute in metric units.
$7
$8
rising falling
$9 $10 $11
24-6
OL-25174-02
Chapter 24
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
Ensure that the DCNM-LAN server is configured for an SMTP server. For more information about configuring the DCNM-LAN server, see the Cisco DCNM Installation and Licensing Guide, Release 5.x.
e. f. g.
(Optional) In the corresponding Settings and Action areas, configure a Falling Threshold. (Optional) Click the Threshold Bindings tab to view bindings. Click Deploy.
The rule is deployed. When you exit DCNM-LAN and Save Pending Changes is checked in the Warning dialog box, click Yes to save the rule.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Threshold Rules. The rules appear in the Summary pane. From the Summary pane, right-click the appropriate rule. From the drop-down list, choose Delete Threshold Rule. A warning dialog box appears and displays Are you sure you want to delete? Click Yes. The rule is deleted.
Step 2 Step 3
Step 4
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Threshold Rules. The rules appear in the Summary pane. Edit any appropriate areas.
Step 2
Note
24-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Threshold Rules. The rules appear in the Summary pane. Click on a rule to view it.
Step 2
DETAILED STEPS
Step 1
From the Feature Selector pane, choose the appropriate feature. For example, if you wanted to see statistics for an Ethernet port, choose Interfaces > Physical > Ethernet. The available devices appear in the Summary pane. From the Summary pane, choose the appropriate device. Click the Statistics tab. In the toolbar, click New Chart and then from the drop-down list choose the chart that you want to view. For example, if you wanted to see statistics for traffic, choose Traffic Statistics Chart. In the chart toolbar, click Launch Threshold Setting.
Additional References
For additional information related to administering threshold rules, see the following sections:
Related Documents
Related Topic Events Statistical Data Collection Document Title System Management Configuration Guide, Cisco DCNM for LAN, Release 5.x Chapter 25, Administering Statistical Data Collection
24-8
OL-25174-02
Chapter 24
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Releases 5.2(0)
Feature Information
24-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
24-10
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
25
Information About Statistical Data Collection, page 25-1 Licensing Requirements for Statistical Data Collection, page 25-2 Prerequisites for Statistical Data Collection, page 25-2 Guidelines and Limitations for Statistical Data Collection, page 25-3 Configuring Statistical Data Collection, page 25-3 Viewing the Status of Statistical Data Collectors, page 25-9 Field Descriptions for Statistical Data Collection, page 25-9 Additional References, page 25-11 Feature History for Statistical Data Collection, page 25-11
Automatic and Manual Purging of Statistical Data, page 25-2 Virtualization Support, page 25-2
25-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Days of the week and time of day that automatic purging occurs. Whether DCNM-LAN determines which statistical data to purge by the age of the data or by a maximum number of database entries. Whether DCNM-LAN deletes the statistical data entries that it purges or consolidates them into one entry.
Virtualization Support
DCNM-LAN treats each virtual device context (VDC) on a Cisco NX-OS device as a separate device. Statistical data collections contain statistics from objects within devices.
For information about obtaining and installing a Cisco DCNM LAN Enterprise license, see the Cisco DCNM Installation and Licensing Guide, Release 5.x.
The DCNM-LAN server must be able to connect to the devices. The system clocks for the DCNM-LAN server and DCNM-LAN client must be synchronized. If the system clocks are not synchronized, scheduling tasks for data collection may start or end at incorrect times. The Cisco NX-OS device must be running a supported version of Cisco NX-OS. The Cisco NX-OS device must have the minimal configuration that is required to enable device discovery to succeed. For more information, see the Verifying the Discovery Readiness of a Cisco NX-OS Device section on page 16-8.
25-2
OL-25174-02OL-25174-02
Chapter 25
Administering Statistical Data Collection Guidelines and Limitations for Statistical Data Collection
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Collections are created by starting monitoring for a new chart. For more information, see the Starting Statistical Monitoring for a Chart section on page 14-12. For the Statistical Data Collection feature, the DCNM-LAN client does not automatically update the information shown in the Summary pane. To ensure that you are viewing current information, from the menu bar, choose View > Refresh. When you start statistical monitoring for one or more charts and then close the DCNM-LAN client, a dialog box prompts you to decide whether to stop the collections or let them run. We recommend that you stop any unnecessary collections when you log out of the DCNM-LAN client. This practice conserves database space and decreases the server load. We recommend that you configure automatic purging of statistical data to ensure that the DCNM-LAN database size does not grow too large.
Starting and Stopping Statistical Data Collection, page 25-3 Using Modes in Statistics Charts, page 25-4 Deleting Statistical Data from a Collection, page 25-5 Deleting a Collection, page 25-5 Deleting Data from the Statistics Database, page 25-6 Enabling and Disabling Automatic Statistical Data Purging, page 25-6 Configuring Automatic Statistical Data Purge Settings, page 25-7 Purging Statistical Data Now, page 25-8
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Statistical Data Collection. A table of statistical data collectors appears in the Contents pane. Each row corresponds to a collector for a particular device. The Status field displays whether the collector is running or is stopped.
Step 2
25-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 3
To start a collector, from the menu bar, choose Actions > Start Collection. The Status field changes to Running. To stop a collector, from the menu bar, choose Actions > Stop Collection. The Status field changes to Stopped.
Path Interfaces > Physical Interfaces > Physical Interfaces > Logical Interfaces > Logical Interfaces > Logical Switching Switching > Spanning Tree Switching > Spanning Tree Switching > Fabricpath Switching > Layer 2 Security Switching > Layer 2 Security Switching > Layer 2 Security Switching > Layer 2 Security Switching > Layer 2 Security Security Security > Access Control Security > Access Control Security > Access Control Security > AAA Inventory
Feature Ethernet Interface Management Interface Loopback Interface Port Channel vPC VLAN Rapid PVST+ MST ISIS Process Port Security ARP Inspection DHCP Snooping Traffic Storm Control IGMP Snooping DOT1x IPv4 ACL IPv6 ACL MAC ACL Server Groups Virtual Switch
DETAILED STEPS
Step 1
From the Feature Selector pane, choose the appropriate feature. For example, if you wanted to see statistics for the Ethernet feature, choose Interfaces > Physical > Ethernet.
25-4
OL-25174-02OL-25174-02
Chapter 25
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The available devices appear in the Summary pane.
Step 2 Step 3 Step 4 Step 5 Step 6 Step 7
From the Summary pane, double-click the device. From the Summary pane, double-click Slots. Click the interface. From the Details pane, choose the Statistics tab. In the toolbar, click New Chart and then from the menu bar drop-down list, choose the chart that you want to view. For example, if you wanted to see statistics for traffic, choose Traffic Statistics Chart. (Optional) To toggle between the statistics mode and the rate mode, click the button to the right of the Select Frequency drop-down list.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Statistical Data Collection. A table of statistical data collectors appears in the Contents pane. Each row corresponds to a collector for a particular device. Devices are listed alphabetically. The Status field displays whether the collector is running or is stopped.
Step 2 Step 3
Right-click the collection. From the menu bar, choose Actions > Delete Statistical Data. DCNM-LAN deletes all statistical data from the collection.
Deleting a Collection
You can delete a collection of statistical data from a specific device. Each collection process represents a statistical monitoring process that you created by starting monitoring for a device configuration feature.
Note
If you want to delete all data from a collections rather than deleting the collection itself, perform the steps in the Deleting Statistical Data from a Collection section on page 25-5.
25-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Statistical Data Collection. A table of statistical data collectors appears in the Contents pane. Devices are listed alphabetically. Each row corresponds to a collection of statistical data for a particular device.
Step 2 Step 3
Click the collection of data that you want to delete. From the menu bar, choose Actions > Delete Collection. The collection is deleted. You do not need to save your changes.
Note
If you want to delete all data from a specific collection rather than deleting old data from all collections, perform the steps in the Deleting a Collection section on page 25-5.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Statistical Data Collection. The Statistics Database area appears in the Contents pane, below the table of statistical data collectors. From the Delete statistical data older than drop-down list, select the date and time of the newest statistics that you want to delete and click OK. Click Delete. DCNM-LAN deletes all statistics older than the date and time that you specified.
Step 2 Step 3
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Statistical Data Collection.
25-6
OL-25174-02OL-25174-02
Chapter 25
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The Statistical Database Administration tab appears in the Details pane, below the table of statistical data collectors.
Step 2
To enable automatic statistical data purging, check Enable Auto Purge. To disable automatic statistical data purging, uncheck Enable Auto Purge.
Step 3
From the menu bar, choose File > Deploy to save your changes to the DCNM-LAN server.
Age of statistical dataDCNM-LAN can purge all statistical data entries that are older than a specific number of days, weeks, or months. Number of statistical data entries in the databaseWhen the number of statistical data entries in the database exceeds the maximum number that you specify, DCNM-LAN can purge the oldest statistical data entries first until the maximum number is not exceeded.
If you enable both criteria, DCNM-LAN applies them independently of each other.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Statistical Data Collection. The Statistical Database Administration tab appears in the Details pane, below the table of statistical data collectors.
Step 2
Under Purge Threshold, configure the criteria that DCNM-LAN uses to determine which statistical data to purge. You can configure either or both of the criteria usingthe information in Table 25-1.
Table 25-2
Purge Criteria
25-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
How to Configure
1. 2. 3.
Check Data older than. From the first drop-down list, choose the number of days, weeks, or months. From the second drop-down list, choose Days, Weeks, or Months, as needed. Check Stats. Entries Exceed(0-2147483647). In the box, enter the maximum number of entries that you want to allow in the statistical database.
1. 2.
Step 3
Configure the action that you want DCNM-LAN to take on statistical database entries that meet the purge criteria. You can choose one of the following:
DeleteDCNM-LAN deletes the database entries that meet the purge criteria. ConsolidateDCNM-LAN merges all statistical data entries that meet the purge criteria into one entry Check the days-of-the-week check boxes to specify which days of the week that you want automatic purging to occur. Use the Run at box to configure the exact time on the specified days that you want automatic statistical data purging to occur.
Step 4
Under Auto Purge Settings, follow these steps to configure when you want automatic purging to occur:
a. b.
Step 5 Step 6
(Optional) If you want to enable automatic statistical data purging, check Enable Auto Purge. From the menu bar, choose File > Deploy to save your changes to the DCNM-LAN server.
Tip
If you want to delete statistical data on demand, based on the exact age of the statistical data entries, see the Deleting Data from the Statistics Database section on page 25-6.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > Statistical Data Collection.
25-8
OL-25174-02OL-25174-02
Chapter 25
Administering Statistical Data Collection Viewing the Status of Statistical Data Collectors
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The Statistical Database Administration tab appears in the Details pane, below the table of statistical data collectors.
Step 2
Under Purge, click Purge Now. DCNM-LAN deletes statistical data, using the automatic statistical data purge settings to determine which statistical data entries to purge.
Summary Pane, page 25-9 Statistical Database Administration Tab, page 25-10
Summary Pane
Table 25-3 Summary Pane
Field
Statistical Data Collectors
Description Display only. Date and time that the DCNM-LAN client updated information shown on the Content pane. Display only. Name and IP address of the device for the corresponding poller. Display only. Username of the DCNM-LAN user who started monitoring for the chart that corresponds to the collection. Display only. Name and IP address of the device that is providing the statistical data in the collection. Display only. Description of the entity on the device that is providing the statistical data in the collection. For example, if the collection has statistical data for a rule that is assigned the sequence number 10 and is in an IPv4 ACL named acl-01, this field displays acl-01,seqNo=10. If the collection has data for the Ethernet 1/5 port, this field displays Ethernet1/5.
25-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 25-3 Summary Pane (continued)
Description Display only. Type of statistical data in the collection. For example, if the collection has statistical data for a rule in an IPv4 ACL, this field displays IpAclAceMatchStatistics. Display only. Whether the collector is started or stopped. Date and time of the newest statistical data to be deleted from the statistics database. There is no default value for this field.
Status
Statistics Database
Description Date and time of the newest statistical data to be deleted from the statistics database. There is no default value for this field. Whether automatic statistical data purging deletes or consolidates statistical data entries that trigger the purge threshold. Consolidation merges all statistical data entries that trigger the purge threshold into one entry. Whether, during automatic statistical data purging, DCNM-LAN deletes statistics entries that are older than the age specified in the drop-down lists located to the right of this check box. By default, this check box is unchecked. If you check the check box, the default age is 1 day. Whether, during automatic statistical data purging, DCNM-LAN deletes the oldest statistics entries until the number of entries equals the number in the box located to the right of this check box. By default, this check box is unchecked. If you check the check box, the default number of event is 25,000. Whether automatic purging of statistical data is enabled. By default, this check box is disabled. Days of the week that automatic purging of statistical data occurs. By default, none of the check boxes are checked. If you check the Daily check box, the check boxes for the individual days of the week become unavailable. Time of day that automatic purging of statistical data occurs, on the days of the week that automatic purging is enabled.
Action
Purge Threshold
Run at
25-10
OL-25174-02OL-25174-02
Chapter 25
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Additional References
For additional information related to administering statistical data collection, see the following sections:
Related Documents
Related Topic Device discovery Document Title Chapter 16, Administering Device Discovery
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Releases 5.0(2)
25-11
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
25-12
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
26
Information About Network Analysis, page 26-1 Licensing Requirements for Network Analysis, page 26-2 Prerequisites for Network Analysis, page 26-2 Guidelines and Limitations for Network Analysis, page 26-2 Using the Network Analysis Feature, page 26-2 Related Documents, page 26-8 Feature History for Network Analysis, page 26-8
Supports real time and historical network analysis between two user specified devices or ports. The user specifies the required monitoring intervals. Supports an archive of historical Network Analysis measurements for the following:
End to end round trip time. Switching delay at each hop. Link delay between hops per path.
Provides reports that contain the resulting statistical information as a chart or summary table.
26-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Network Analysis only pertains to the devices that DCNM-LAN has discovered.
Specify the IP addresses for devices to monitor the network path between two end hosts or between a host and a server. This allows monitoring of the ingress port of the source connected switch to the egress port of the target switch connected to the end host or server. Specify the IP addresses for switches, VLAN, and optional interface information to monitor the path between them. Specify the threshold level for the round trip time to help evaluate the path latency results.
Using Network Analysis, page 26-2 Using the New Path Latency Session Wizard, page 26-4 Viewing Session Statistics, page 26-7
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Analysis > Path Latency Monitoring (PONG).
26-2
OL-25174-02OL-25174-02
Chapter 26
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
The Summary pane appears in the Contents pane. Each row in the table is a path latency session. You are able to view the sessions that you have created as well as the sessions created by other users. See Table 26-1. Users with administrator privileges are allowed to modify other users sessions.
Table 26-1 Information in Summary Pane
Column Session ID Session Name Source Switch Destination Switch VLAN Class of Service (CoS) Round Trip Time (microseconds) Forward Delay (microseconds)
Description Unique ID of the session created by the user. The ID is updated after the user deploys the session. Unique name entered by user for the path latency session. IP address of the source switch from which path latency is monitored. IP address of the destination switch to which the path latency is monitored. VLAN ID through which the actual traffic flows (1 to 4094). Optional value used to filter the traffic monitoring based on class of service value (0 to 7). CoS values are shown in Table 26-2. Minimum, maximum, average and latest value of the round trip time (two way path: source <-> destination) of all the RTT latencies calculated up until current time. Minimum, maximum, average and latest value of the forward delay (forward path: source -> destination) of all the forward delay latencies calculated to the current time. Minimum, maximum, average and latest value of the reverse delay (reverse path: destination -> source) of all the reverse delay latencies calculated to the current time. Creator of the session. Success percentage of the packets traversed from source to destination during the specified time interval. Date and time when the monitoring was started. Column that specifies:
26-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 26-2
User Priority 0 1 2 3 4 5 6 7
Step 2
Traffic Type Background Best Effort Excellent Effort Critical Applications Video, < 100 ms latency Voice, < 10 ms latency Internetwork Control Network Control
Above the Summary pane, click the Configure New Rule link to set a threshold rule for one of the following parameters.
Note
Clicking Configure New Rule links you to Theshold Rules of the DCNM-LAN Server Administration feature.
Step 3
Above the Summary pane, click the Set Global Threshold link to set a global threshold rule for the following parameters:
The global threshold setting is applied to all the sessions in the Summary Table.
Step 4
Above the Summary pane, click the VLAN-CoS button to view the sessions grouped by VLAN-CoS.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Analysis > Path Latency Monitoring (PONG). The Summary pane appears in the Contents pane. In the Summary pane, right-click and choose New Path Latency Session in the context menu. The New Path Latency Session wizard appears.
Step 2
26-4
OL-25174-02OL-25174-02
Chapter 26
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 3
In the Select Session Monitor Option of Interest screen, enter the following:
Session Name (Length: 1 to 256 characters) VLAN (Value: 1 to 4094) Class of Service (CoS)
CoS Values and Corresponding Traffic Types
Table 26-3
User Priority 0 1 2 3 4 5 6 7
Step 4
Traffic Type Background Best Effort Excellent Effort Critical Applications Video, < 100 ms latency Voice, < 10 ms latency Internetwork Control Network Control
Monitor latency between source VDC and destination VDC. Monitor latency between source and destination VDC including source switching delay. Monitor latency between source and destination VDC including destination switching delay. Monitor latency between source and destination VDC including both switching delays.
Under the Monitor latency between source VDC and destination VDC option, you can additionally choose to measure the latency between switches that have Fabric Path mode connectivity. The latency measurements are measured between the source and destination switches but do not include the switching delay of both the end switches.
Note
For the switches that are in a classical ethernet cloud, the wizard allows you to choose their VDC MAC addresses/IP addresses/hostnames in the following wizard screen. Click Next to continue.
Step 5
Choose the source switch by clicking on the ellipses next to the Select Source Switch field. Highlight the device in the screen that appears and click OK to enter your selection. Choose the destination switch by clicking on the ellipses next to the Select Destination Switch field. Highlight the device in the screen that appears and click OK to enter your selection.
Depending on the earlier selection that you made in the Select Option section of the wizard, Table 26-4 list the required and optional information that you must enter in the Select Source and Destination Switch screen.
26-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 26-4
Option Monitor latency between source VDC and destination VDC Monitor latency between source and destination VDC including source switching delay
Required
Optional
Egress/outbound interface through which the packet flows out from the source. N/A
Source and destination Inject/ingress interface through which the packet needs to be injected from the source switch. Also requires the source static MAC address associated with the interface. Source and destination Egress/outbound interface through which the packet terminates at the destination switch. Also requires the destination static MAC address associated with the interface. Source and destination Inject/ingress interface through which the packet needs to be injected from the source switch. Also requires source static MAC address associated with the interface. Egress/outbound interface through which the packet terminates at the destination switch. Also requires the destination static MAC address associated with the interface.
Monitor latency between source and destination VDC including destination switching delay
Egress/outbound interface through which the packet flows out from the source.
Monitor latency between source and destination VDC including both switching delays
N/A
Note
You can enter any arbitrary unique static MAC address that points to the selected interface. To configure a new static MAC address, use one of the following recommended addresses to avoid any conflict with globally administered MAC addresses (associated with any other host/devices):
26-6
OL-25174-02OL-25174-02
Chapter 26
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
where X is a hexadecimal value.
In the dialog box that appears, click OK to start input verification. The Input Verification screen appears and the results are displayed. Input verification verifies the following:
Path latency measurement between specified devices. Packet traversal between the specified devices.
If the verification fails, you must specify the information that you entered earlier in the wizard. Table 26-5 lists the additional settings that are available in the Input Verification window:
Table 26-5 Input Verification Settings
Setting Monitor Interval End Time Calculate Jitter No. of Packets to send
Description Interval of time between data collection points. Time of session termination Variance of inter packet RTT delay Packet count to send for the session to measure latency. To calculate jitter (inter packet delay variance), more than 1 packet has to be sent.
Value 0.5 - 5 minutes (Default: 5 minutes) N/A Default: unchecked 1 -5 packets (Default: 1 packet)
DETAILED STEPS
Step 1
From the Feature Selector pane, choose Network Analysis > Path Latency Monitoring (PONG). The Summary pane appears in the Contents pane. Right-click a session and choose Go To Statistics in the context menu. The statistics for the session appear as a chart and a table of detailed information in the Details pane. In the Details pane, click the Path Latency tab to display RTT information about each path. In the Details pane, right-click to display a context menu of additional statistical displays:
Step 2
Step 3 Step 4
26-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 5
Path specific switching delaySwitching delay of all the switches traversed in each path. Path specific link delayLink delay at each hop traversed in each path. Switching delay of each switch across different paths traversed in the session. Link delay of each link across different paths traversed in the session.
In the Details pane, click the Session Report tab to display overall statistical information about the session. The information can be exported as an Excel .xls file by cllicking the export button near the top of the table.
Related Documents
For additional information related to the topology map, see the following sections: Related Topic Device discovery Network servers Document Title Chapter 16, Administering Device Discovery Chapter 20, Configuring Network Servers
Releases 5.2(0)
26-8
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
27
Information About Administering DCNM-LAN Server Log Settings, page 27-1 Licensing Requirements for Administering DCNM-LAN Server Log Settings, page 27-2 Prerequisites for Administering DCNM-LAN Server Log Settings, page 27-2 Guidelines and Limitations for Administering DCNM-LAN Server Log Settings, page 27-3 Configuring DCNM-LAN Server Log Settings, page 27-3 Viewing DCNM-LAN Server Log Settings, page 27-4 Field Descriptions for DCNM-LAN Server Log Settings, page 27-5 Additional References, page 27-6 Feature History for DCNM-LAN Server Log Settings, page 27-7
Note
The DCNM-LAN Server Log Settings feature does not affect logging levels of Cisco NX-OS devices. DCNM-LAN does not support the configuration of device logging levels. This section includes the following topics:
Logging Levels, page 27-2 Log File and Location, page 27-2 Virtualization Support, page 27-2
27-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Logging Levels
The DCNM-LAN server supports a hierarchy of logging levels, ordered by the severity of log messages. Each level includes messages for that level in addition to all log messages from levels of higher severity. The logging levels, in order from the highest to the lowest severity, are as follows:
By default, when you install the DCNM-LAN server on Microsoft Windows Server, INSTALL_DIR is C:\Program Files\Cisco Systems\dcnm.
Virtualization Support
DCNM-LAN server logs do not contain log messages from Cisco NX-OS devices; therefore, this feature has no effect on virtualization support.
You should be familiar with a DCNM-LAN feature before you configure server log settings for it.
27-2
OL-25174-02OL-25174-02
Chapter 27
Administering DCNM-LAN Server Log Settings Guidelines and Limitations for Administering DCNM-LAN Server Log Settings
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Setting a logging level to a lower severity results in more messages in the log file. We recommend using the default logging settings unless you are troubleshooting an issue. When you are troubleshooting an issue, consider lowering the logging level severity of the affected feature or server component. After you resolve an issue, consider restoring the logging level of the affected feature or server component to a higher severity.
Configuring the Default Logging Level, page 27-3 Configuring a Unique Logging Level for a Feature or Server Component, page 27-3 Configuring a Feature or Server Component to Use the Default Logging Level, page 27-4
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > DCNM Server Log Settings. The log settings appear in the Contents pane. From the Default Logging Level drop-down list, choose the logging level. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Step 2 Step 3
27-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
BEFORE YOU BEGIN
Determine what the logging level of the feature or service should be. For more information, see the Logging Levels section on page 27-2.
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > DCNM Server Log Settings. The log settings appear in the Contents pane. Find the feature or server component that you want to configure with a unique logging level. Uncheck Default to the right of the feature or server component. The logging level drop-down list for the feature or server component becomes available. From the logging level drop-down list, choose the logging level. For more information, see the Logging Levels section on page 27-2. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Step 2 Step 3
Step 4 Step 5
DETAILED STEPS
Step 1
From the Feature Selector pane, choose DCNM Server Administration > DCNM Server Log Settings. The log settings appear in the Contents pane. Find the feature or server component that you want to use the default logging level. Check Default to the right of the feature or service. The logging level drop-down list for the feature or server component becomes unavailable. From the menu bar, choose File > Deploy to apply your changes to the DCNM-LAN server.
Step 2 Step 3
Step 4
27-4
OL-25174-02OL-25174-02
Chapter 27
Administering DCNM-LAN Server Log Settings Field Descriptions for DCNM-LAN Server Log Settings
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Description Logging level for the features or server components whose Default check box is checked. The default value for this list is Informational. For more information about logging levels, see the Logging Levels section on page 27-2. Whether logging for the corresponding feature uses the default logging level or the logging level specified for the feature. When a Default check box is checked, the logging level list for the corresponding feature is unavailable. By default, these check boxes are unchecked. Logging level for the AAA feature. Logging level for the access control list feature. Logging level for the 802.1X feature. Logging level for the Gateway Load-Balancing Protocol feature. Logging level for the Interfaces feature. Logging level for the keychain management feature. Logging level for the layer 2 security feature, which are as follows:
DCNM-LAN Features
Default
Dynamic ARP inspection Port security DHCP snooping IP Source Guard Traffic storm control
Object Tracking Port Channel SPAN Spanning Tree Tunnel Virtual Devices VLAN FabricExtender VPC
Logging level for the object tracking feature. Logging level for the port security feature. Logging level for the SPAN feature. Logging level for the STP feature. Logging level for the tunnel interface management feature. Logging level for the virtual device context feature. Logging level for the VLAN feature. Logging level for the Fabric Extender feature. Logging level for the vPC feature.
27-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 27-1 DCNM-LAN Server Log Settings Contents Pane (continued)
Description Logging level for the HSRP feature. Logging level for the Device Groups feature. Whether logging for the corresponding server component uses the default logging level or the logging level specified for the component. When a Default check box is checked, the logging level list for the corresponding component is unavailable. By default, these check boxes are unchecked. Logging level for the event component, which includes messages about how DCNM-LAN processes the system and accounting logs it retrieves from devices and also events generated by DCNM-LAN. Logging level for the statistical data collection component. Logging level for the configuration archive component, used by the Configuration Change Management feature. Logging level for the component that connects the DCNM-LAN server to devices. Logging level for the component that performs device discovery.
Event
Additional References
For additional information related to administering DCNM-LAN server log settings, see the following sections:
Related Documents
Related Topic Troubleshooting DCNM-LAN Document Title Chapter 30, Troubleshooting DCNM-LAN
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
27-6
OL-25174-02OL-25174-02
Chapter 27
Administering DCNM-LAN Server Log Settings Feature History for DCNM-LAN Server Log Settings
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Releases 5.0(2)
Feature Information Support was added for configuring the logging level for the Device Groups feature.
27-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
27-8
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
28
Information About Starting and Stopping DCNM-LAN Servers, page 28-1 Licensing Requirements for Starting and Stopping Cisco DCNM-LAN Servers, page 28-1 Starting DCNM-LAN Servers, page 28-2 Stopping DCNM-LAN Servers, page 28-5 Related Documents, page 28-8 Feature History for Starting and Stopping a DCNM-LAN Server, page 28-9
28-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Starting a Single DCNM-LAN Server, page 28-2 Starting a Cluster of DCNM-LAN Servers, page 28-3
Starting a Single DCNM-LAN Server (Microsoft Windows Server), page 28-2 Starting a Single DCNM-LAN Server (RHEL), page 28-2
DETAILED STEPS
Step 1
Open the Control Panel window and choose Administrative Tools > Services. The Services window opens. Right-click Cisco DCNM Server and choose Start.
Step 2
Note
Alternatively, you can choose Start > All Programs > Cisco DCNM Server > Start DCNM Server; however, the location of shortcuts depends upon the choices you made when you installed the DCNM-LAN server.
A splash screen opens while the DCNM-LAN server starts. This screen closes once the DCNM-LAN server is running.
28-2
OL-25174-02OL-25174-02
Chapter 28
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
DETAILED STEPS
Step 1
Use the Start_DCNM_LAN_Server script to start the server on a RHEL operating system. The DCNM-LAN server opens a server console window and displays the processes it runs to start the server. The server is running when you see a Started in Xm:XXs:XXXms message.
DETAILED STEPS
Step 1
Start the server that you want to be the master server of the cluster. To do so, follow the steps for starting a single DCNM-LAN server for the applicable operating system:
Starting a Single DCNM-LAN Server (Microsoft Windows Server), page 28-2 Starting a Single DCNM-LAN Server (RHEL), page 28-2
Step 2
28-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 3
One at a time, start the other servers in the cluster. After starting a server, wait at least one minute before starting the next server. This delay helps ensure faster stabilization of the server cluster. For each server, follow the steps for starting a single DCNM-LAN server for the applicable operating system:
Starting a Single DCNM-LAN Server (Microsoft Windows Server), page 28-2 Starting a Single DCNM-LAN Server (RHEL), page 28-2
Note
DETAILED STEPS
Step 1
To access Install Manager, navigate to the dcnm-install-manager.sh file that is located in the bin folder where the DCNM-LAN server was installed. The default bin folder location for servers running Linux is /usr/local/Cisco/dcm/dcnm/bin. Double click the dcnm-install-manager.sh file to launch Install Manager. In the tool bar, click the New icon near the top of the Install Manager GUI for every secondary server. A new row in the list of Server Nodes is created every time the New icon is clicked.
Step 2 Step 3
Note
In the toolbar, click the Delete icon to delete a selected row in the list of Server Nodes. This step does not delete a secondary server from the clustered-server environment.
Step 4
For each secondary server represented by a row in the list of Server Nodes, enter the following:
Server name or IP address in the Server Name/IP Address field. Protocol used for connectivity in the Protocol field. The protocol is either Telnet or SSH. User credentials (user ID and password) used for connecting to the secondary server in the User Credentials field. The user credentials are used for SSH connectivity to the server. Telnet connectivity to the server does not require user credentials. Alternatively, default user credentials may be set by entering the credentials in the Default Credentials section of the GUI. The default credentials are used when the User Credential field is blank.
(Optional) Comments that may be useful to identify the secondary server in the Comments field.
The Last Action Status column in the list of Server Nodes includes the success or failure status of the last performed action. Clicking the + icon for the Last Action Status expands the display to show the entire log of actions performed on the server.
28-4
OL-25174-02OL-25174-02
Chapter 28
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 5 Step 6
In the list of Server Nodes, select the secondary servers to start. In the toolbar, click the Verify icon to verify the connectivity to the selected secondary servers. Correct any connectivity issues before continuing. In the toolbar, click the Start icon to start the selected secondary servers.
Step 7
Note
The Install Manager is a standalone application. The settings specified are not saved and are not persistent. The settings are lost when the Install Manager GUI is closed.
Stopping Single DCNM-LAN Servers, page 28-5 Stopping a Cluster of DCNM-LAN Servers, page 28-6
Stopping a Single DCNM-LAN Server (Microsoft Windows Server), page 28-5 Stopping a Single DCNM-LAN Server (RHEL), page 28-6
DETAILED STEPS
Step 1
Open the Control Panel window and choose Administrative Tools > Services. A window opens listing the Windows services. Right-click Cisco DCNM Server and choose Stop.
Step 2
Note
Alternatively, you can choose Start > All Programs > Cisco DCNM Server > Stop DCNM Server; however, the location of shortcuts depends upon the choices you made when you installed the DCNM-LAN server.
28-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
A splash screen opens while the DCNM-LAN server begins to shut down. When the DCNM-LAN server has stopped, the splash screen closes.
Note
DETAILED STEPS
Step 1
Use the Stop_DCNM_LAN_Server script to stop the server on a RHEL operating system. The DCNM-LAN server opens a server console window and displays the processes that it runs to stop the server. The server is stopped when you see a Stopped at Xm:XXs:XXXms message.
DETAILED STEPS
Step 1 Step 2
On the master server, access a command prompt. Use the cd command to change the directory to the bin directory under the Cisco DCNM installation directory, as follows: cd path
28-6
OL-25174-02OL-25174-02
Chapter 28
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
where path is the relative or absolute path to the bin directory. For Microsoft Windows, the default path to the Cisco DCNM bin directory is C:\Program Files\Cisco Systems\dcm\dcnm\bin. For RHEL, the default path to the bin directory is /usr/local/cisco/dcm/dcnm/bin.
Step 3
Run the stop-dcnm-cluster script. The script name depends upon the server operating system, as shown in the following table: Server Operating System Microsoft Windows Linux Stop DCNM Cluster Script stop-dcnm-cluster.bat stop-dcnm-cluster.sh
Example
The following example from a Microsoft Windows server shows how to stop a cluster of DCNM-LAN servers, with DCNM-LAN installed in the default directory:
C:\Documents and Settings\Administrator>cd "C:\Program Files\Cisco Systems\dcm\dcnm\bin" C:\Program Files\Cisco Systems\dcm\dcnm\bin>stop-dcnm-cluster.bat C:\Program Files\Cisco Systems\dcm\dcnm\bin>set JAVA_HOME=C:\Program Files\Cisco Systems\ dcm\java\jre1.5 C:\Program Files\Cisco Systems\dcm\dcnm\bin>"C:\Program Files\Cisco Systems\dcm\ jboss-4.2.2.GA\bin\twiddle.bat" -s 172.28.254.254:1099 invoke "com.cisco.dcbu.dcm:service=ClusterServerInfo" stopServerInstancesInCluster 10 Shutdown Triggered for all Servers Successfully C:\Program Files\Cisco Systems\dcm\dcnm\bin>
Note
DETAILED STEPS
Step 1
To access Install Manager, navigate to the dcnm-install-manager.sh file that is located in the bin folder where the DCNM-LAN server was installed. The default bin folder location for servers running Linux is /usr/local/Cisco/dcm/dcnm/bin. Double click the dcnm-install-manager.sh file to launch Install Manager. In the toolbar, click the New icon near the top of the Install Manager GUI for every secondary server. A new row in the list of Server Nodes is created every time that the New icon is clicked.
Step 2 Step 3
28-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Note
In the toolbar, click the Delete icon to delete a selected row in the list of Server Nodes. This step does not delete a secondary server from the clustered-server environment.
Step 4
For each secondary server represented by a row in the list of Server Nodes, enter the following:
Server name or IP address in the Server Name/IP Address field. Protocol used for connectivity in the Protocol field. The protocol is either Telnet or SSH. User credentials (user ID and password) used for connecting to the secondary server in the User Credentials field. The user credentials are used for SSH connectivity to the server. Telnet connectivity to the server does not require user credentials. Alternatively, default user credentials can be set by entering the credentials in the Default Credentials section of the GUI. The default credentials are used when the User Credential field is blank.
(Optional) Comments that might be useful to identify the secondary server in the Comments field.
The Last Action Status column in the list of Server Nodes includes the success or failure status of the last performed action. Clicking the + icon for the Last Action Status expands the display to show the entire log of actions performed on the server.
Step 5 Step 6
In the list of Server Nodes, choose the secondary servers to stop. In the toolbar, click the Verify icon to verify the connectivity to the selected secondary servers. Correct any connectivity issues before continuing. In the toolbar, click the Stop icon to stop the selected secondary servers.
Step 7
Note
The Install Manager is a standalone application. The settings specified are not saved and are not persistent. The settings are lost when you exit the Install Manager GUI.
Related Documents
Related Topic Deploying single DCNM-LAN servers and deploying DCNM-LAN server clusters Viewing server cluster information Backing up, cleaning, and restoring DCNM-LAN databases Document Title Cisco DCNM Installation and Licensing Guide, Release 5.x Chapter 22, Working with Cluster Administration Chapter 29, Maintaining the Cisco DCNM-LAN Database
28-8
OL-25174-02OL-25174-02
Chapter 28
Starting and Stopping Cisco DCNM-LAN Servers Feature History for Starting and Stopping a DCNM-LAN Server
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Releases 5.0(2)
Feature Information Support for starting and stopping a cluster of servers was introduced.
28-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
28-10
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
CH A P T E R
29
Information About Database Maintenance, page 29-1 Licensing Requirements for Database Maintenance, page 29-3 Prerequisites for Database Maintenance, page 29-3 Guidelines and Limitations for Database Maintenance, page 29-3 Performing Database Maintenance, page 29-4 Additional References, page 29-9 Feature History for DCNM-LAN Database Maintenance, page 29-9
Automatic and Manual Purging of Data, page 29-1 Database Backup, page 29-2 Database Clean, page 29-2 Database Restore, page 29-2
29-1
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Days of the week and time of day that automatic purging occurs. Whether DCNM-LAN determines which data to purge by the age of the data or by a maximum number of database entries. For event-related data, whether DCNM-LAN determines which events to purge by event severity.
We recommend that you configure automatic purging of events and statistical data to ensure that the DCNM-LAN database size does not grow too large. You can also manually purge events and statistical data. For more information, see the following sections:
Automatic and Manual Purging of Event Data, page 23-2 Automatic and Manual Purging of Statistical Data, page 25-2
Database Backup
You can use the Cisco DCNM database backup script to create a backup file of the DCNM-LAN database. We strongly recommend that you regularly back up the DCNM-LAN database and that you archive backup files in a secure location that is not on the DCNM-LAN server system. You should retain the backup files as long as required by the standards of your organization.
Database Clean
You can use the Cisco DCNM database clean script to clean the DCNM-LAN database. Cleaning removes all DCNM-LAN data from the database and is a necessary step prior to restoring the DCNM-LAN database. Any database records that have not been backed up are lost when you clean the database. You can also clean the database if you want to delete all data and rebuild your DCNM-LAN implementation without restoring data from a backup.
Note
Database clean script is unavailable from the DCNM Everest release onwards.
Database Restore
You can use the Cisco DCNM database restore script to restore the DCNM-LAN database from a backup file. The backup file must have been created by the DCNM-LAN database backup script included in the same release of DCNM-LAN that you are restoring the data to. For example, if you are running Cisco DCNM Release 5.0(2), you should only perform database restoration from a backup of Cisco DCNM Release 5.0(2). Also, the backup file must have been created from the same database type and release that you are restoring the data to. For example, if you are restoring data to an Oracle 11g database, the backup file must have been created from an Oracle 11g database. Before you restore a DCNM-LAN database, you should clean the database. Restoring a database without cleaning the database can have unpredictable results.
29-2
OL-25174-02OL-25174-02
Chapter 29
Maintaining the Cisco DCNM-LAN Database Licensing Requirements for Database Maintenance
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
You must have successfully installed the DCNM-LAN server. Cleaning the DCNM-LAN database requires that you stop the DCNM-LAN server. Restoring the DCNM-LAN database requires the following:
You must have a backup file created from exactly the same release of DCNM-LAN that you are
operating system as the database that you want to restore. For example, backup files made from a database running in Microsoft Server 2003 can only be used to restore other DCNM-LAN databases running in Microsoft Server 2003.
We recommend that you configure automatic purging of statistical data and event data to ensure that the DCNM-LAN database size does not grow too large. We recommend that you perform backups on a regular basis. Follow the standards of your organization to determine how frequently you should perform backups. You can only restore a DCNM-LAN database from a backup of the same release of DCNM-LAN. For example, if you are running Cisco DCNM Release 5.0(2), you should only perform database restoration from a backup of Cisco DCNM Release 5.0(2). You can only restore a DCNM-LAN database from a backup of the same database type and release as the current database. For example, if the current database is an Oracle 11g database, you can only restore it with a backup file made from an Oracle 11g database. You can only restore a DCNM-LAN database from a backup file that was made from a DCNM-LAN database running in the same operating system as the database that you want to restore. For example, backup files made from a database running in Microsoft Server 2003 can only be used to restore other DCNM-LAN databases running in Microsoft Server 2003.
29-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Backing Up the DCNM-LAN Database, page 29-4 Cleaning a DCNM-LAN Database, page 29-5 Restoring a DCNM-LAN Database from a Backup File, page 29-7
DETAILED STEPS
Step 1 Step 2
On the DCNM-LAN server, access a command prompt. Use the cd command to change the directory to the bin directory under the Cisco DCNM installation directory, as follows: cd path where path is the relative or absolute path to the bin directory. For Microsoft Windows, the default path to the bin directory is C:\Program Files\dcm\dcnm\bin. For RHEL, the default path to the bin directory is /usr/local/cisco/dcm/dcnm/bin.
Step 3
Run the Cisco DCNM database backup script. The script name depends upon the server operating system and database type, as shown in the following table: Server Operating System Microsoft Windows Linux Database Type PostgreSQL Oracle PostgreSQL Oracle Backup Script Name backup-pgsql-dcnm-db.bat backup-oracle-dcnm-db.bat backup-pgsql-dcnm-db.sh backup-oracle-dcnm-db.sh
Enter the filename for the backup that you are creating. At the confirmation prompt, enter y to continue with the backup. Verify that the backup file was created as you specified and has a file size greater than zero.
On Linux, use the ls -l command. On Microsoft Windows, use the dir command.
Step 7
Store the backup file in a safe location. We recommend that you copy the backup file to a secure location that is off the DCNM-LAN server system so that you can protect your data from the potential of a catastrophic hardware failure.
29-4
OL-25174-02OL-25174-02
Chapter 29
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Example
The following example from a Windows server shows how to create a backup named masterbackup.bkp from a PostgreSQL DCNM-LAN database that was installed using default values:
C:\Documents and Settings\Administrator>cd "C:\Program Files\Cisco Systems\dcm\dcnm\bin" C:\Program Files\Cisco Systems\dcm\dcnm\bin>backup-pgsql-dcnm-db.bat ======================================================== Database Postgres Environment PostgreSQL Bin Path : ""C:\Program Files\Cisco Systems\dcm\db"\bin" DCNM Database Name : "dcmdb" DCNM Database User Name : "dcnmuser" ========================================================
Please enter the filename to be used for Database Backup:masterbackup.bkp "" "Database Schema "dcnmuser" will be backed up in filename : masterbackup.bkp" "" Continue y/n [n] : y . . . Database backup File: woobie1 Operation Completed C:\Program Files\Cisco Systems\dcm\dcnm\bin>dir masterbackup.bkp Volume in drive C has no label. Volume Serial Number is D415-F632 Directory of C:\Program Files\PostgreSQL\8.2\bin 06/15/2009 01:53 PM 900,129 masterbackup.bkp 1 File(s) 900,129 bytes 0 Dir(s) 23,960,858,624 bytes free C:\Program Files\Cisco Systems\dcm\dcnm\bin>
You want to restore the DCNM-LAN database from a backup. You want to delete all data and rebuild your DCNM-LAN implementation without restoring data from a backup.
The DCNM-LAN server installer configures the clean script with the database username and database name that you specified during the server installation.
29-5
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
BEFORE YOU BEGIN
Back up the DCNM-LAN database. Any data not preserved in a backup is lost when you clean the database. Stop the DCNM-LAN server. The DCNM-LAN server must be down before you can finish the database cleaning procedure. For more information, see the Stopping DCNM-LAN Servers section on page 28-5.
DETAILED STEPS
Step 1 Step 2 Step 3
On the DCNM-LAN server, access a command prompt. If you have not already done so, stop the DCNM-LAN server. For more information, see the Stopping DCNM-LAN Servers section on page 28-5. Use the cd command to change the directory to the bin directory under the Cisco DCNM installation directory, as follows: cd path where path is the relative or absolute path to the bin directory. For Microsoft Windows, the default path to the bin directory is C:\Program Files\dcm\dcnm\bin. For RHEL, the default path to the bin directory is /usr/local/cisco/dcm/dcnm/bin.
Step 4
Run the Cisco DCNM database clean script. The script name depends upon the server operating system and database type, as shown in the following table: Server Operating System Microsoft Windows Linux Database Type PostgreSQL Oracle PostgreSQL Oracle Clean Script clean-pgsql-dcnm-db.bat clean-oracle-dcnm-db.bat clean-pgsql-dcnm-db.sh clean-oracle-dcnm-db.sh
Step 5 Step 6
At the confirmation prompt, enter y to continue with cleaning the database. If you want to restore the DCNM-LAN database from a backup, proceed to the Restoring a DCNM-LAN Database from a Backup File section on page 29-7. Do not start the DCNM-LAN server. If you do not want to restore the DCNM-LAN database from a backup and want to rebuild your DCNM-LAN implementation manually, start the DCNM-LAN server. See the Starting a Single DCNM-LAN Server section on page 28-2.
Example
The following example from a Windows server shows how to clean a PostgreSQL DCNM-LAN database that was installed using default values:
C:\Documents and Settings\Administrator>cd "C:\Program Files\Cisco Systems\dcm\dcnm\bin" C:\Program Files\Cisco Systems\dcm\dcnm\bin>clean-pgsql-dcnm-db.bat ========================================================
29-6
OL-25174-02OL-25174-02
Chapter 29
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Database Postgres Environment PostgreSQL Bin Path : ""C:\Program Files\Cisco Systems\dcm\db"\bin" DCNM Database Name : "dcmdb" DCNM Database User Name : "dcnmuser" DCNM Database SuperUser Name : "cisco" =========================================================
*************************************************************************** PLEASE MAKE SURE THE DCNM SERVICE IS SHUTDOWN BEFORE RUNNING THIS SCRIPT!! ***************************************************************************
DETAILED STEPS
Step 1 Step 2
On the DCNM-LAN server, access a command prompt. If you have not already done so, stop the DCNM-LAN server. For more information, see the Stopping DCNM-LAN Servers section on page 28-5.
29-7
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 3
Use the cd command to change the directory to the bin directory under the Cisco DCNM installation directory, as follows: cd path where path is the relative or absolute path to the bin directory. For Microsoft Windows, the default path to the bin directory is C:\Program Files\dcm\dcnm\bin. For RHEL, the default path to the bin directory is /usr/local/cisco/dcm/dcnm/bin.
Step 4
Run the Cisco DCNM database restore script. The script name depends upon the server operating system and database type, as shown in the following table: Server Operating System Microsoft Windows Linux Database Type PostgreSQL Oracle PostgreSQL Oracle Restore Script restore-pgsql-dcnm-db.bat restore-oracle-dcnm-db.bat restore-pgsql-dcnm-db.sh restore-oracle-dcnm-db.sh
Enter the name of the backup file that you want to use to restore the DCNM-LAN database. At the confirmation prompt, enter y to continue with the database restore. To resume using DCNM-LAN, start the DCNM-LAN server. See the Starting a Single DCNM-LAN Server section on page 28-2.
Example
The following example from a Microsoft Windows server shows how to restore a DCNM-LAN PostgreSQL database that was installed using default values and using a backup file named masterbackup.bkp that exists in the bin directory Cisco DCNM installation directory:
C:\Documents and Settings\Administrator>cd "C:\Program Files\Cisco Systems\dcm\dcnm\bin"
C:\Program Files\Cisco Systems\dcm\dcnm\bin>restore-pgsql-dcnm-db.bat ======================================================== Database Postgres Environment PostgreSQL Bin Path : ""C:\Program Files\Cisco Systems\dcm\db"\bin" DCNM Database Name : "dcmdb" DCNM Database User Name : "dcnmuser" ========================================================
*************************************************************************** PLEASE MAKE SURE THE DCNM SERVICE IS SHUTDOWN BEFORE RUNNING THIS SCRIPT!! ***************************************************************************
29-8
OL-25174-02OL-25174-02
Chapter 29
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
"Database Schema "dcnmuser" will be Restore from filename : masterbackup.bkp" "" Continue y/n [n] : y "Cleaning the database... . . . "Done" pg_restore: connecting to database for restore . . . Restored Database from : masterbackup.bkp Operation Completed C:\Program Files\Cisco Systems\dcm\dcnm\bin>
Additional References
For additional information related to maintaining the DCNM-LAN database, see the following sections:
Related Documents
Related Topic Automatic purge of event data Automatic purge of statistical data Document Title Chapter 23, Administering Auto-Synchronization with Devices Chapter 25, Administering Statistical Data Collection
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Releases 5.0(2)
29-9
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
29-10
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
C H A P T E R
30
Troubleshooting DCNM-LAN
This chapter describes how to troubleshoot common issues you might experience while using Cisco Data Center Network Manager for LAN (DCNM-LAN).
Note
For troubleshooting DCNM-LAN server installation issues, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. This chapter includes the following sections:
Tips for Using DCNM-LAN, page 30-1 Trouble with Starting the DCNM-LAN Server, page 30-2 Trouble with the DCNM-LAN Database, page 30-3 Trouble with the DCNM-LAN Client, page 30-5 Trouble with Device Discovery or Device Status, page 30-11 Trouble with Device Management, page 30-12 Trouble with Topology, page 30-12 Trouble with Device OS Management, page 30-13 Trouble with Event Browsing, page 30-13
Events Tabs Show Fewer Events than the Event Browser, page 30-1 Event Browser Pie Chart May Be Inaccurate for Small Numbers, page 30-2
30-1
Chapter 30
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Solution For troubleshooting DCNM-LAN server installation issues, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. Start the Postgres service:
In Microsoft Windows Server, choose Start > All Programs > Postgres 8.2 > Start Service. In RHEL, use the following command: /DCNM/db/bin/DB start Correct the Postgres user credentials. For more information, see the Updating DCNM-LAN Database Name and Username in pgAdmin III section on page 30-3. Start the DCNM-LAN server. For more information, see the Starting DCNM-LAN Servers section on page 28-2. Check the server log for messages such as Port port-number already in use. The server log is the following file: Installation_directory\jboss-4.2.2.GA\server\dcnm\ log\server.log
1.
2.
1.
2. 3.
Determine which application is using the port and stop or reconfigure the application. Restart the DCNM-LAN server.
30-2
Chapter 30
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Trouble with a PostgreSQL Database, page 30-3 Trouble with an Oracle Database, page 30-4
Note
If the DCNM-LAN database fails or communication to the DCNM-LAN database fails, you must stop the DCNM-LAN server or shut down the cluster of DCNM-LAN servers before addressing the problem. Always verify that the DCNM-LAN database and the communication to the DCNM-LAN database are functioning properly before restarting the DCNM-LAN server or cluster of DCNM-LAN servers.
Symptom Error message states that the DCNM-LAN database does not exist. Error message states that password authentication failed for the DCNM-LAN database username.
Possible Cause The DCNM-LAN database name might have changed during an upgrade or reinstallation of the DCNM-LAN server software. The DCNM-LAN database username may have changed during an upgrade or reinstallation of the DCNM-LAN server software.
Solution In the pgAdmin III application, perform the steps in the Updating DCNM-LAN Database Name and Username in pgAdmin III section on page 30-3.
Open the pgAdmin III application. In the Object Browser pane, under Servers, click PostgreSQL Database Server 8.2. In the right-hand pane, the Properties tab appears with several other tabs. On the Properties tab, double-click Maintenance database. A dialog box displays a Properties tab for the server. If you need to change the database name, click the Maintenance DB field and type the correct DCNM-LAN database name.
Step 3
Step 4
Note
The database name should be the name that you specified when you most recently upgraded or reinstalled the DCNM-LAN server software.
30-3
Troubleshooting DCNM-LAN
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Step 5
If you need to change the database username, click the Username field and type the correct DCNM-LAN database username.
Note
The database username should be the database username that you specified when you most recently upgraded or reinstalled the DCNM-LAN server software.
Step 6 Step 7
Click OK. In the Object Browser pane, double-click PostgreSQL Database Server 8.2. If you changed the username in Step 5, the Connect to Server dialog box appears. If necessary, enter the password for the username that you specified in Step 5 and click OK. The pgAdmin III application connects to the DCNM-LAN database and displays the databases and login roles. If you need additional assistance, see the Help menu in the pgAdmin III application or see the pgAdmin web site at the following URL: http://pgadmin.org/docs/1.6/index.html
Step 8
30-4
OL-25174-02OL-25174-02
Chapter 30
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 30-3 DCNM-LAN server.log File Errors with an Oracle Database
Solution
1.
Stop the DCNM-LAN server. See Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers. Increase the SYSTEM table space. For more information, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. Start the DCNM-LAN server. See Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers. Stop the DCNM-LAN server. See Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers. Increase the number of sessions and processes to 150 each. For more information, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. Start the DCNM-LAN server. See Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers. Stop the DCNM-LAN server. See Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers. Increase the number of open cursors to 1000. For more information, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. Start the DCNM-LAN server. See Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers.
2.
3.
The number of available [org.hibernate.util.JDBCExceptionReporter] Could sessions and processes is inadequate. not create connection; - nested throwable:
(java.sql.SQLException: Listener refused the connection with the following error: ORA-12519, TNS:no appropriate service handler found
1.
2.
3.
1.
2.
3.
Cannot Download the DCNM-LAN Client from the Server, page 30-6 Cannot Install the DCNM-LAN Client, page 30-6 Cannot Start the DCNM-LAN Client, page 30-7 Cannot Log into the DCNM-LAN Client, page 30-8 Client Loses Connection to the DCNM-LAN Server, page 30-10
30-5
Troubleshooting DCNM-LAN
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Possible Cause You are using the wrong URL or web server port. The TCP port is blocked by a gateway device. You are using an unsupported web browser.
Solution Verify that you are using the correct URL, including the port number. Open the TCP port in your firewall. For information about ports used by DCNM-LAN, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. Use a supported web browser. For more information about supported web browsers, see the Cisco DCNM Release Notes, Release 5.x.
Solution The DCNM-LAN client installer requires Internet access to download the Java version 1.6.0_21 JRE. If the system cannot access the Internet, use another system to download the Java installer, copy it to the system that you want to install the DCNM-LAN client on, install Java, and restart the DCNM-LAN client installation. You can download Java version 1.6.0_21 JRE from the Oracle Technology Network website.
Your network environment requires the If your network environment requires a proxy connection use of a proxy connection to access the to permit the download of the Java installer, ensure that the Internet. proxy settings are configured in Internet Options, available from the Control Panel.
30-6
OL-25174-02OL-25174-02
Chapter 30
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Possible Cause The client installation may be corrupted. The wrong version of Java may be installed.
Solution
1.
Uninstall the DCNM-LAN client. For more information, see the Uninstalling the DCNM-LAN Client section on page 13-8. Download and install the DCNM-LAN client from the DCNM-LAN server. During the client installation, allow DCNM-LAN to install the supported version of Java on the computer. When you download the client from the DCNM-LAN server, if the supported version of Java is not detected on the computer, DCNM-LAN asks you for permission to install the supported version of Java. Your browser may notify you that the Java installer was digitally signed by an expired certificate. To continue, confirm the installation. For more information, see the Downloading and Launching the DCNM-LAN Client section on page 13-3.
2.
30-7
Troubleshooting DCNM-LAN
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
30-8
OL-25174-02OL-25174-02
Chapter 30
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 30-7 Cannot Log into the DCNM-LAN Client
Symptom
Possible Cause
Solution Ask a DCNM-LAN administrator to reset your password using one of the following scripts:
Cannot log into You forgot your password. the DCNM-LAN client.
For Microsoft Windows, use dcnm_root_directory/dcm/dcnm/bin/pwreset.bat (by default, dcnm_root_directory is c:\Program Files\Cisco Systems\dcm\dcnm\bin). For Linux, use dcnm_root_directory/dcm/dcnm/bin/pwreset.sh (by default, the dcnm_root_directory is /usr/local/cisco).
To reset a password, run the appropriate script for the operating system that you are using, and then enter the user ID to be reset and the password to be used for it. If no one has administrative access to DCNM-LAN, you can reset the local administrator account or change DCNM-LAN server authentication settings by reinstalling the DCNM-LAN server software. For more information, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. Authentication servers are not configured to authenticate DCNM-LAN users. If DCNM-LAN is configured to use authentication servers, ensure that every authentication server that you have configured DCNM-LAN to use is configured to accept authentication requests from the DCNM-LAN server. If you have deployed DCNM-LAN in a clustered-server environment, ensure that every authentication server is configured to accept requests from each DCNM-LAN server in the cluster. Restart the DCNM-LAN server. See the Starting a Single DCNM-LAN Server section on page 28-2. Ensure that the computer that runs the DCNM-LAN client meets the network requirements for using the DCNM-LAN client remotely. Any gateway network devices between the DCNM-LAN client and server must allow connections to the DCNM-LAN web server and to the DCNM-LAN server. By default, the DCNM-LAN web server listens to port 8080 and the DCNM-LAN server listens to port 1099; however, you can configure these ports during DCNM-LAN server installation. If you need to change either port, reinstall the server and choose the Full Reinstall option. For information about ports used by DCNM-LAN, see the Cisco DCNM Installation and Licensing Guide, Release 5.x. Do the following:
1. 2.
The DCNM-LAN server IP address changed after you installed the server.
Ensure that the IP address of the DCNM-LAN server is statically assigned. Reinstall the DCNM-LAN server and choose the Full Reinstall option, which allows you to specify the server IP address. See the Cisco DCNM Installation and Licensing Guide, Release 5.x. Log into the DCNM-LAN client and specify the new IP address of the DCNM-LAN server in the DCNM-LAN Server field of the login dialog box.
3.
30-9
Troubleshooting DCNM-LAN
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 30-7 Cannot Log into the DCNM-LAN Client (continued)
Symptom
Possible Cause
Solution In the DCNM-LAN client login window, click More and, in the Port field, change the port number that your DCNM-LAN server uses. See the Restarting the DCNM-LAN Client section on page 13-7. If you want to change the port that the DCNM-LAN server listens to, reinstall the DCNM-LAN server and choose the Full Reinstall option, which allows you to specify the DCNM-LAN server port. See the Cisco DCNM Installation and Licensing Guide, Release 5.x.
Cannot log into The wrong DCNM-LAN server the port number was used in the DCNM-LAN login attempt. client (continued).
When you try to log into the DCNM-LAN client, you receive the error message Can not resolve DCNM-LAN server hostname via DNS. Make sure that DCNM-LAN server has a valid DNS entry.
You used a hostname to specify Ensure that DNS on your network has an entry for the DCNM-LAN the DCNM-LAN server during server hostname. the login and DNS does not have an entry for the DCNM-LAN server.
Symptoms
Possible Cause
Solution Restart the DCNM-LAN client. Restart the DCNM-LAN server. See Chapter 28, Starting and Stopping Cisco DCNM-LAN Servers. Investigate your network to determine if it meets the network requirements for using the DCNM-LAN client remotely. For information about ports used by DCNM-LAN, see the Cisco DCNM Installation and Licensing Guide, Release 5.x.
Client loses The client had a failure. connection to the The DCNM-LAN server is down. server. The DCNM-LAN The DCNM-LAN server is client window is unreachable. pink.
30-10
OL-25174-02OL-25174-02
Chapter 30
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Symptoms
Solution Reenter the username and password, and try discovering the device again. If you are attempting to discover CDP neighbors of the seed device, ensure that the credentials that you provide are valid on all devices that you want to discover.
Reenable the SSH server on the device and try discovering the device again.
The maximum number of SSH sessions Check the number of user sessions on the device. Free at that the device can support has been least one connection and try discovering the device again. reached. CDP is disabled on the device or on the Ensure that CDP is enabled on the device globally and that device interface that the DCNM-LAN it is enabled on the specific interface that the DCNM-LAN server connects to. server connects to. The device interface that the Ensure that the device interface that the DCNM-LAN DCNM-LAN server connects to is shut server connects to is up. down. The device restarted or shut down before discovery could complete. The DCNM-LAN server cannot reach the device. Ensure that the device is running and try discovering the device again. Ensure that the network requirements for device management are met. See the Verifying the Discovery Readiness of a Cisco NX-OS Device section on page 16-8. Use the clear logging logfile command to clear the system log in the device and try to manually discover the device. Use the clear accounting log command to clear the accounting log messages in the device and try to manually discover the device.
Note
When working with a custom VDC, clear the accounting log messages only from the default VDC.
30-11
Troubleshooting DCNM-LAN
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Symptom Clearing the log file or the accounting log on a Cisco NX-OS device does not cause DCNM-LAN to rediscover the device automatically.
Possible Cause
Solution
The device did not generate a system Rediscover the device. For more information, see the message about the accounting log or Discovering a Device section on page 17-4. the log file being cleared. This problem is particularly likely if the device is a Cisco MDS 9000 Family Multilayer Switch running Cisco SAN-OS Release 3.1 or earlier releases. You can do either of the following:
The DCNM-LAN The DCNM-LAN server was down. client shows device configuration information that is out of date.
Rediscover the device. For more information, see the Discovering a Device section on page 17-4. Restart the DCNM-LAN server with a clean database. If the server was down for a long time, this action is the recommended solution.
1. 2. 3.
Stopping DCNM-LAN Servers, page 28-5 Cleaning a DCNM-LAN Database, page 29-5 Starting DCNM-LAN Servers, page 28-2
Symptom
Possible Cause
Solution
Links between Cisco MDS 9000 Family Multilayer Switches continue appear after the link has gone down.
Devices are connected by Rediscover the devices that topology incorrectly shows as Gigabit Ethernet or Fast Ethernet linked. ports, and are running Cisco SAN-OS Release 3.1 or earlier releases.
30-12
OL-25174-02OL-25174-02
Chapter 30
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Symptom
Possible Cause
Solution Use a file server that is on the same LAN as the devices included in the software installation job. If all of the available file servers transfer software image files too slowly, before you create the software installation job, manually copy the files to the devices that you will include the job and configure the job to use the manually copied files rather than a file server. For information about configuring a software installation job, see the System Management Configuration Guide, Cisco DCNM for LAN, Release 5.x.
During a software The connection between the file installation job, the server and the device is slow. software image file transfer between a file server and a device takes too much time.
Symptom
Possible Cause
Solution
Events available on the device command line do not appear in the DCNM-LAN client. Too few events are shown in Event Browser or an Events tab.
Logging levels on managed devices are Check the logging level configuration on managed devices. set incorrectly. See the Cisco NX-OS System-Message Logging Requirements section on page 16-4. The DCNM-LAN client fetches events Check the events-related setting in the DCNM-LAN client that are not old enough. preferences. For more information, see the Configuring the Maximum Age of Events Fetched from the Server section on page 14-16.
30-13
Troubleshooting DCNM-LAN
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table 30-13 Trouble with Event Browsing
Symptom Too many events are shown in Event Browser or on an Events tab.
Possible Cause
Solution
A managed device has an issue that is Temporarily unmanage the device until you resolve the generating many system log messages. issues on the device. For more information, see the Unmanaging a Device section on page 17-5. Logging levels on managed devices are Check the logging level configuration on managed devices. set incorrectly. See the Cisco NX-OS System-Message Logging Requirements section on page 16-4. By design, an Events tab shows only messages that apply to the currently selected feature and may show only a subset of the possible messages for the feature. For more information, see the Events Tabs Show Fewer Events than the Event Browser section on page 30-1. Use the Event Browser to see status-related system messages received by DCNM-LAN. For more information, see the System Management Configuration Guide, Cisco DCNM for LAN, Release 5.x.
A feature Events tab does not show events that appear in the Event Browser.
30-14
OL-25174-02OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
P A R T
Appendices
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
A P P E N D I X
Setting the Seed Switch in Cisco SAN-OS Releases 3.1(1) to 3.2(1), page A-1 Setting the Seed Switch in Releases Prior to Cisco SAN-OS Release 3.1(1), page A-2
As of Cisco SAN-OS Release 3.1(1), the Fabric Manager login procedure changed. If you are running a version of Cisco SAN-OS that is earlier than Cisco SAN-OS 3.1(1), follow the login instructions in the Setting the Seed Switch in Releases Prior to Cisco SAN-OS Release 3.1(1) section on page A-2. From Cisco SAN-OS Release 3.1(1) to Release 3.2(1), you must log in to Fabric Manager Server before you discover or open fabrics, and these fabrics can have different user credentials. You can specify different SNMP communities per switch on the Web Server.
Note
The default user name is admin and the default password is password for your initial login. This information is stored in the database. Both the Fabric Manager Server and the Web Server share the same user credential database. To log in to Fabric Manager Server and to open a fabric, follow these steps:
Step 1
Double-click the Fabric Manager Client icon on your workstation. You see the Fabric Manager Server Login dialog box. Set FM Server to the IP address where you installed Fabric Manager Server, or set it to localhost if you installed Fabric Manager Server on your local workstation. If you forget your password, you can run one of the following scripts:
Step 2
A-1
Appendix A Setting the Seed Switch in Releases Prior to Cisco SAN-OS Release 3.1(1)
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
bin\webUserAdd.bat admin password adds a user name and password to the Fabric Manager
Server database.
bin\DBReset.bat resets the database back to the initial state and removes any discovered
Enter the Fabric Manager Server user name and password. Check the Use SNMP Proxy check box if you want Fabric Manager Client to communicate with Fabric Manager Server through a TCP-based proxy server. Click Login. After you successfully log in to Fabric Manager Server, you can set the seed switch and open the fabrics that you are entitled to access. You see the Discover New Fabric dialog box. Set the fabric seed switch to the Cisco MDS 9000 Family switch that you want Fabric Manager to use. Enter the user name and password for the switch. Choose the Auth-Privacy option MD5-DES (default) when you log in.
Note
The Accelerate Discovery check box should remain checked for normal operation. Uncheck this only if you have changed switch IP addresses. You may experience problems with SAN IDs in Fabric Manager if you uncheck this check box.
Step 9
Click Discover. You see the Open Fabric dialog box. Check the check box(es) next to the fabric(s) you want to open in the Select column, or click the Discover button to add a new fabric.
Step 10
Note
As of Cisco SAN-OS Release 3.1(1) and later, opening multiple fabrics is a licensed feature. You will get a message if any of the fabrics discovered does not have a license.
Note
As of Cisco SAN-OS Release 3.1(2b), a license can be a permanent license, an evaluation license, or there are no licenses (all evaluation licenses have expired).
Step 11
Setting the Seed Switch in Releases Prior to Cisco SAN-OS Release 3.1(1)
Note
As of Cisco SAN-OS Release 3.1(1), the Fabric Manager login procedure changed. If you are running Cisco SAN-OS Releases 3.1(1) to 3.2(1), then follow the login instructions in the Setting the Seed Switch in Cisco SAN-OS Releases 3.1(1) to 3.2(1) section on page A-1.
A-2
OL-25174-02
Appendix A
Launching Fabric Manager in Cisco SAN-OS Releases Prior to 3.2(1) Setting the Seed Switch in Releases Prior to Cisco SAN-OS Release 3.1(1)
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
When you run Fabric Manager, you must select a switch for Fabric Manager to use to discover the fabric. For releases earlier than Cisco SAN-OS Release 3.1(1), use the same user name and password on each of the multiple fabrics that you open, then log in directly to the MDS 9000 Family switch that you want Fabric Manager to use. To set the seed switch if you are running a version of Cisco SAN-OS that is earlier than Cisco SAN-OS Release 3.1(1), follow these steps:
Step 1
Double-click the Fabric Manager Client icon on your workstation. You see the Fabric Manager Login dialog box. Click the Options button if necessary to expand the optional settings in this dialog box. Set FM Server to the IP address where you installed Fabric Manager Server, or set it to localhost if you installed Fabric Manager Server on your local workstation. Set the fabric seed switch to the MDS 9000 Family switch that you want Fabric Manager to use. Enter the user name and password for the switch. Check the Use SNMP Proxy check box if you want Fabric Manager Client to communicate with Fabric Manager Server through a TCP-based proxy server.
Note
The Accelerate Discovery check box should remain checked for normal operation. Uncheck this only if you have changed switch IP addresses. You may experience problems with out of sync SAN IDs in Fabric Manager if you uncheck this check box.
Step 7
A-3
Appendix A Setting the Seed Switch in Releases Prior to Cisco SAN-OS Release 3.1(1)
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
A-4
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
A P P E N D I X
Chapter/Category
Obtaining and Installing Licenses Backing Up License Files Initial Configuration Starting a Switch (Initial Setup) Configuring Console Settings Configuring COM1 and Modem Settings Adjusting for Daylight Savings Time Configuring the Initialization String Basic Switch Configuration Terminal Settings File System Commands Displaying File Contents Software Images Manual Upgrade on a Dual Supervisor Switch Corrupted Bootflash Recovery
B-1
Appendix B
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table B-1 Features Not Supported by Cisco DCNM or Device Manager (continued)
Part
Chapter/Category
Procedure Compressing and Uncompressing Files Displaying the Last Lines in a File Executing Commands Specified in a Script Setting the Delay Time Displaying Configuration Files Unlocking the Startup Configuration File Accessing Remote File Systems
Copying Images to the Standby Supervisor Clock Modules Connecting to a Module Preserving Module Configuration Purging Module Configuration EPLD Configuration Configuring SSI Boot Image Managing SSMs
3 Switch Configuration
Displaying the ALPA Cache Contents Clearing the ALPA Cache Schedule Configuration Inter-VSAN Routing (IVR) FICON Support IVR Service Groups Displaying and Clearing ARP Caches Tuning Configuration IPS Module Core Dumps Remote SPAN
Inter-VSAN Routing Configuration Configuring FCIP Configuring the SAN Extension Tuner Configuring IP Storage
B-2
OL-25174-02
Appendix B
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table B-1 Features Not Supported by Cisco DCNM or Device Manager (continued)
Part 10 Troubleshooting
Procedure Loop Monitoring Configuring CIM CFS for FC Timers Local Text Based Capture Capturing FC Analyzer Frames Locally Sending Captured FC Analyzer Frames to a Remote IP Address Clearing Configured FC Analyzer Information Displaying a List of Hosts Configured for Remote Capture Using Fabric Analyzer Display Filters
Monitoring System Processes and Saving the Last Core to Flash Logs Kernel Core Dumps System Health Initiation Loopback Test Configuration Frequency Hardware Failure Action Tests for a Specified Module Clearing Previous Error Reports Online Health Management System
Enabling and Disabling the OHMS Enabling and Disabling Hardware Failure Action Configuring Onboard Failure Logging Clearing Previous Error Reports Performing Tests for a Specified Module Configuring Automatic Loopback Tests Performing SERDES Loopback Tests
B-3
Appendix B
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
B-4
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
A P P E N D I X
Reason Code Link failure or not connected SFP not present Initializing
Description Physical layer link is not operational. The small form-factor pluggable (SFP) hardware is not plugged in. The physical layer link is operational and the protocol initialization is in progress. Cisco MDS SAN-OS waits for the specified R_A_TOV time before retrying initialization. The interface VSAN is deleted or is in a suspended state. To make the interface operational, assign that port to a configured and active VSAN.
Reconfigure fabric in progress The fabric is currently being reconfigured. Offline Inactive
A hardware failure is detected. Error conditions require administrative attention. Interfaces may be error-disabled for various reasons. For example:
To make the interface operational, you must first fix the error conditions causing this state; and next, administratively shut down or enable the interface.
C-1
Appendix C
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Table C-1 Reason Codes for Nonoperational States (continued)
Reason Code Isolation due to ELP failure Isolation due to ESC failure Isolation due to domain overlap Isolation due to domain ID assignment failure Isolation due to other side E port isolated Isolation due to invalid fabric reconfiguration Isolation due to domain manager disabled Isolation due to zone merge failure Isolation due to VSAN mismatch Nonparticipating
Description Port negotiation failed. Port negotiation failed. The Fibre Channel domains (fcdomain) overlap. The assigned domain ID is not valid. The E port at the other end of the link is isolated. The port is isolated due to fabric reconfiguration. The fcdomain feature is disabled. The zone merge operation failed. The VSANs at both ends of an ISL are different. FL ports cannot participate in loop operations. It may happen if more than one FL port exists in the same loop, in which case all but one FL port in that loop automatically enters nonparticipating mode.
The interfaces belonging to the PortChannel are down. Only PortChannel interfaces Suspended due to incompatible The interfaces belonging to the PortChannel have speed incompatible speeds. Suspended due to incompatible The interfaces belonging to the PortChannel have mode incompatible modes. Suspended due to incompatible An improper connection is detected. All interfaces in a remote switch WWN PortChannel must be connected to the same pair of switches.
C-2
OL-25174-02
S e n d
c o m m e n t s
t o
d c n m -d o c f e e d b a c k @c is c o . c o m
A P P E N D I X
Fibre Channel Support, page D-1 Zone Configuration, page D-1 Security, page D-2 Events, page D-2 Managing Cisco FabricWare with DCNM, page D-3
E F FL Fx Auto
Cisco FabricWare supports Fabric Shortest Path First (FSPF) as the standard path selection protocol used by Fibre Channel fabrics. The FSPF feature is enabled by default on all Fibre Channel switches. Except in configurations that require special consideration, you do not need to configure any FSPF services. FSPF automatically calculates the best path between any two switches in a fabric.
Zone Configuration
Zoning enables you to set up access control between storage devices or user groups. If you have administrator privileges in your fabric, you can create zones to increase network security and to prevent data loss or corruption. Zoning is enforced by examining the source-destination ID field. Cisco FabricWare does not support QoS, broadcast, LUN, or read-only zones.
D-1
Appendix D Security
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
You can use the DCNM zone configuration tool to manage zone sets, zones, and zone membership for switches running Cisco FabricWare. Cisco FabricWare supports zone membership by pWWN. Refer Cisco MDS 9000 Family Fabric Manager Fabric Configuration Guide.
Security
Cisco FabricWare supports the following security features:
Cisco FabricWare can use the RADIUS protocol to communicate with remote AAA servers. RADIUS is a distributed client/server protocol that secures networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco MDS 9000 Family switches and send authentication requests to a central RADIUS server that contains all user authentication and network service access information. You can access the CLI using the console (serial connection), Telnet, or Secure Shell (SSH). For each management path (console or Telnet and SSH), you can configure one or more of the following security control options: local, remote (RADIUS), or none. Using these access methods, you can configure the roles that each authenticated user receives when they access the switch. Cisco FabricWare supports two fixed roles: network administrator and network operator. IP access lists (IP-ACLs) control management traffic over IP by regulating the traffic types that are allowed or denied to the switch. IP-ACLs can only be configured for the mgmt0 port. DCNM Server uses SNMPv1 and SNMPv2 to communicate with Cisco FabricWare.
Events
You can monitor fabric and switch status for Cisco FabricWare switches through either a syslog server or an SNMP trap receiver. The syslog, or system message logging software, saves messages in a log file or directs the messages to other devices. This feature provides you with the following capabilities:
Provides logging information for monitoring and troubleshooting Allows you to select the types of captured logging information Allows you to select the destination server to forward the captured logging information
By default, the switch logs normal but significant system messages to a log file and sends these messages to the system console. You can specify which system messages should be saved based on the type of facility and the severity level. You can access logged system messages using the CLI or by saving them to a properly configured system message logging server. You can configure the Cisco MDS 9020 Switch using the CLI to send notifications to SNMP managers when particular events occur. You can send these notifications as traps.
D-2
OL-25174-02
Appendix D
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Feature Zones
FabricWare Capabilities Zone configuration Zone membership by pWWN No Cisco FabricWare support for QoS, broadcast, LUN, or read-only zones
Guide Refer to the Cisco MDS 9000 Family Fabric Manager Fabric Configuration Guide
Interfaces
1/2/4 Fibre Channel autonegotiating ports Refer to the Cisco MDS 9000 Family DCNM Interfaces Configuration Guide SNMPv1 and SNMPv2c Refer to the Cisco MDS 9000 Family DCNM System Management Configuration Guide Refer to the Cisco MDS 9000 Family DCNM System Management Configuration Guide Refer to the Cisco MDS 9020 Switch Configuration Guide and Command Reference.
SNMP
Software images
Displaying FLOGI details Registering name server proxies Displaying FDMI RSCN statistics
Security
Configuring RADIUS Configuring server groups Configuring role-based authorization Configuring user accounts Configuring SSH services
Refer to the Cisco MDS 9000 Family DCNM Security Configuration Guide.
Fibre Channel routing FSPF global configuration FSPF interface configuration IP services IP access control lists on mgmt0
Refer to the Cisco MDS 9020 Switch Configuration Guide and Command Reference. Refer to the Cisco MDS 9000 Family DCNM Security Configuration Guide. Refer to the Cisco MDS 9000 Family DCNM Fundamentals Configuration Guide. Refer to the Cisco MDS 9000 Family Fabric Manager Fabric Configuration Guide
System messages
Advanced configuration
FC timer
D-3
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
D-4
OL-25174-02
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
INDEX
A
AAA server Admin tab description aliases switching between global device aliases and fcaliases 3-10 using with FDCNM-SAN ALPA caches clearing ARP caches clearing displaying
B-2 B-2 B-2 B-2 3-10 2-36 2-56 11-14
B-1
adminDown tooltip
C
CAs DCNM-SAN Web Services channelAdminDown tooltip
2-11 11-14 11-14
displaying contents
Cisco DCNM Enterprise LAN License adding a device to a license Cisco DCNM-LAN client
21-5, 23-5 18-3 18-3
poller interval
password, default
B
BB_credits reason codes bootflash: file system
10-4 C-1 11-14
18-3 18-3
bitErrRTThresExceeded tooltip
OL-25174-02
IN-1
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
Cisco MDS SAN-OS software images Cisco NX-OS DCNM-LAN logging requirements Cisco Traffic Analyzer configuring with Performance Manager CLI accessing firewall clock modules managing
B-2 D-2 4-2 9-9 16-4 10-1
D
D_S_TOV errors when setting database DCNM-LAN backing up cleaning guidelines maintenance restoring database files resolving lock errors daylight saving time
22-1 22-4 2-36 29-7 29-4 29-5 29-3 29-1 11-7
Cluster Administration DCNM-LAN description viewing data COM1 ports configuring configuring command scripts executing CompactFlash slot0:
10-4 B-2 B-1
B-1
4-1 to ?? 11-22
corrupted jar file errors detachable tables downgrading error recovery FAQs FCIP
11-1 11-19 11-4 11-7 5-19
command schedulers
B-2
11-6, 11-7
configuration files displaying connectivity troubleshooting tool console settings configuring core dumps IPS modules core files saving to CompactFlash custom reports creating a template Custom tab description
2-30 2-31 B-3 B-2 B-1 5-33 B-2
11-3
11-9 11-22
mixed software environments problems with map changes running with multiple NICs setting preferences upgrade failures description
4-1 4-3 5-28 11-6
11-8 11-20
IN-2
OL-25174-02
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DCNM-SAN Clients advanced mode description filtering
5-1 5-15 5-2
2-11
deniedDueToPortBinding tooltip
5-28
setting preferences
5-24
5-12 5-33
2-40
21-4 21-2
21-5
installation overview
3-3
6-6 6-8
performing administrative tasks performing configuration tasks properties files Solaris support user names viewing logs
3-9 2-51 3-1 3-6 3-1
11-7
11-6, 11-7
11-6
DCNM-SAN Web Server DCNM-SAN Web Services configuring communities configuring users description
2-5 2-55
6-10
trunking
upgrade failures
11-4
IN-3
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
using interface (figure) viewing port status
6-6 6-8 6-3
11-15
11-15
modifying groupings (procedure) Devices and Credentials DCNM-LAN adding a device deleting a device description
17-1 17-4 17-5 17-3
elpFailureIsolation tooltip
elpFailureRatovEdtovMismatch tooltip ELP failures reason codes EPLD images configuring E ports isolation
i-lxiv 11-14 C-2 11-15 11-15 B-2 11-15 C-2
elpFailureUnknownFlowCTLCode tooltip
11-15
discovering a device unmanaging a device DirectX installing documentation additional publications domain IDs duplicates causing errors failures
C-2 11-6
ePortProhibited tooltip
domainAddrAssignFailureIsolation tooltip
11-13
11-7
domainInvalidRCFReceived tooltip domainManagerDisabled tooltip domainMaxReTxFailure tooltip domainOverlapIsolation tooltip domains overlap isolations DPVM wizard
5-33 C-2
11-14
B-3 11-15
domainOtherSideEportIsolation tooltip
11-14
2-23
8-2
2-52
E
E_D_TOV errors when setting
11-7
14-16
IN-4
OL-25174-02
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
configuring maximum event age exporting Performance Manager reports as CSV external CompactFlash formatting
B-2 9-11 14-16
5-31
11-15 11-15
11-16
F
fabric editing monitoring Fabric Analyzer using display filters
B-3 11-15 11-15 11-15 11-15 2-38
fcipSrcModuleNotOnline tooltip
11-16
fabricBindingNoRspFromPeer tooltip fabricBindingSWWNNotFound tooltip Fabric Manager Clients Fabric pane FabricPath fabrics discovery monitoring FabricWare DCNM-SAN support (table) events roles
D-2 D-1 D-3 5-30 3-6 19-9 5-19 5-7
11-16
clearing configured information FICON DCNM-SAN Client support ficonBeingEnabled tooltip ficonNoPortnumber tooltip ficonNotEnabled tooltip ficonVsanDown tooltip
D-2 D-2 D-2 D-1 11-16 11-16 5-2
11-16 11-16
security
zoning support
displaying contents
11-1 11-1
Device Manager
5-23 5-23
IN-5
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
firstPortNotUp tooltip flows performance statistics FL ports nonparticipating codes FSPF flow statistics
7-3 to ?? D-1 C-2 7-1 2-22 11-16 11-16
firstPortUpAsEport tooltip
I
icons Device Manager images See kickstart images; software images; system images images. See kickstart images; software images; system images incomAdminRxBBCreditPerBuf tooltip
11-16 6-5
G
Generation 2 switching modules installing in Generation 1 chassis Gigabit Ethernet interfaces viewing performance information Global preferences DCNM-LAN events preference overview
14-15 14-17 14-16 14-16 2-23 10-14
incompatibleAdminMode tooltip
incompatibleAdminRxBBCredit tooltip incompatibleAdminRxBufferSize tooltip incompatibleadminSpeed tooltip initialization string configuring initializing tooltip install all command failure cases installation DCNM-LAN prerequisites
13-2 11-16 10-4 B-1 11-16 11-16
monitoring preference
preprovisioning preference
interfaceRemoved tooltip
H
hardware failures configuring actions Health tab description high availability software upgrades historical data preserving hosts performance statistics Host Tracking
2-76 7-1 11-19 10-2 2-14 B-3
invalidAttachment tooltip invalidConfig tooltip inventories managing Inventory tab description IP-ACLs wizard
Cisco DCNM Fundamentals Guide, Release 6.x
11-16 11-16
invalidFabricBindExh tooltip
8-4
2-27
5-33
IN-6
OL-25174-02
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
See also IPv4-ACLs; IPv6-ACLs IPFC errors caused by configuration IPS modules core dumps IPv4-ACLs FabricWare support iSCSI DCNM-SAN Client support wizard ISLs performance statistics statistics
9-5 2-27 7-1 5-33 5-2 D-2 B-2 11-8
B-3
11-5
L
LDAP license See Cisco DCNM Enterprise LAN License licenses backing up files
B-1 B-1 11-9 2-21 2-56
viewing detailed inventory information viewing performance information IVR DCNM-SAN Client support FICON support service groups wizard
5-32 B-2 B-2 5-2
11-17
J
Java execution failures
11-6 11-7
linkFailDebounceTimeout tooltip linkFailLinkReset tooltip linkFailLIPF8Rcvd tooltip linkFailLIPRcvdB2B tooltip linkFailLossOfSignal tooltip linkFailLossOfSync tooltip
11-3 11-4 11-17 11-17 11-17 11-17 11-17 11-17
linkFailLineCardPortShutdown tooltip
java.lang.ArrayIndexOutOfBoundsException errorArrayIndexOutOfBoundsException error Java Web Start checking installation not detected
11-4 11-5
hangs on the download dialog running from command line setting up on *.jnlp files JNLP verifying settings
11-3 11-5
linkFailOPNyRETB2B tooltip linkFailOPNyTMOB2B tooltip linkFailPortInitFail tooltip linkFailPortUnusable tooltip linkFailRxQOverFlow tooltip linkFailTooManyINTR tooltip link failures reason codes
C-1
K
kernel core dumps
IN-7
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
linkFailure tooltip logins failure recovery logs increasing log window size viewing information
2-51 8-4 11-10 11-6 11-17
default preferences
viewing using Device Manager loopbackDiagFailure tooltip loopbackIsolation tooltip loopback tests configuring frequency loops monitoring
B-3 B-3 11-17 11-17
orange crosses
11-14 11-14
orange squares with mode purging down elements red crosses red squares
11-14
5-22
11-13
M
management role-based map preferences Automatically Save Layout default Detach Overview Window default Display End Device Labels default Display End Devices default Expand Loops default
5-29 5-29 5-29 5-29 5-29 5-29 5-29 5-29 5-29 5-32
refreshing saving
5-22 11-13
shows two switches when only one tab descriptions viewing large Visio diagrams fan failuresmaps power supply failures
11-13 5-21
11-19
McAfee Internet Suite 6.0 Professional DCNM-SAN installation failures messages selecting severity level modems configuring settings module configurations preserving purging modules
B-2 B-2 B-1 2-54 11-7 11-7
Layout New Devices Automatically default Override Preferences for Non-default Layout default 5-29 Select Switch or Link from Table default
5-29
Use Quick Layout when Switch has >=30 End Devices default 5-29 maps black squares brown squares
11-14 11-14 11-24
B-2
10-14
B-3
IN-8
OL-25174-02
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
monitoring stopping and starting DCNM-LAN Mozilla configuring for Java Web Start multiple fabrics managing
8-4 11-24 11-5 14-12 14-12
2-63
2-54
O
offline tooltip
11-17
N
network administrator roles FabricWare Network Analysis DCNM-LAN PONG
26-2 D-2
OHMS configuring
B-3 11-17
Online Health Management System. See OHMS configuring for Java Web Start other tooltip
8-2 8-3 11-17 11-5
network monitoring device discovery network operator roles FabricWare Network Servers DCNM-LAN binding adapters to a server clearing default credentials clearing unique credentials
20-10 20-4 20-6 20-4 20-5 D-2
mapping topologies
P
parentDown tooltip passwords assigning using DCNM-SAN pcAnyWhere replacing with DirectX stopping
11-6 11-18 11-18 11-6 5-32 11-17
configuring default credentials configuring unique credentials correlating servers description NICs
20-1 20-6
2-30
20-10
manually specifying for DCNM-SAN Client manually specifying for DCNM-SAN Server manually specifying for Device Manager nondisruptive upgrades methods notifications
10-2 11-17
historical monitoring
host-optimized port groups ISL statistics (procedure) real-time monitoring summary reports tables
9-7 9-7 9-1
11-21
nonParticipating tooltip
IN-9
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
using thresholds Performance Manager authentication
4-4 7-4 7-2
C-2
11-18 11-18
9-7
disabling using Device Manager enabling using Device Manager Port Security
11-6
6-8 6-8
wizard preferences
5-33 11-18
verifying collections
9-6
wizard for configuring exporting as XML generating top 10 viewing events viewing graphs
9-7 9-7 9-11 9-8
5-28
Device Manager
Export Tables with Format default Show CFS Warnings default Show Device Name by default
9-7 5-29 5-28
5-28
viewing host-optimized port group performance viewing summary reports viewing tables Performance tab description polling periods changing
3-9 2-16 9-7 9-7
Show Shortened iSCSI Names default Show Timestamps as Date/Time default Telnet Path default
5-28
Show WorldWideName (WWN) Vendor default Use Secure Shell instead of Telnet default
5-28
PONG, See Network Analysis portBindFailure tooltip portBlocked tooltip PortChannels configuring using Device Manager creation dialog box too small down states
C-2 C-2 C-2 11-8 6-8 11-18 11-18 11-18
Q
QoS wizard
5-33
portChannelMembersDown tooltip
R
RADIUS FabricWare support
D-2
incompatible modes
IN-10
OL-25174-02
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
rcfInProgres tooltip reason codes description (table) Red Hat Linux DCNM-SAN Server related documents remote AAA server delayed authentication remote file systems accessing remote SPAN configuring
B-2 B-2 4-2 i-lxiv 2-56 3-1 C-1 11-18
Enable Audible Alert when Event Received default 5-29 Retry request 1 time(s) after 5 sec timeout default 5-29 Trace SNMP packets in Log default SNMPv1 FabricWare support SNMPv2 FabricWare support software images default settings
10-8 10-5 D-2 D-2 5-29
role-based management controlling access roles privileges RRD configuring database RSPAN configuring
B-2 2-61 5-32 2-56
upgrading SAN-OS images variables disruptive mechanisms Solaris DCNM-SAN SSH FabricWare support
D-2 3-1 11-18 10-1
software upgrades
10-2 10-2
srcPortNotBound tooltip
S
SAN extension tuner configuring
B-2
SSI boot images configuring SSL certificates using with DCNM-SAN Web Services SSMs managing boot alert
27-3 27-1 B-2 2-11 B-2
SAN operating system. See Cisco MDS SAN-OS schedulers. See command schedulers Server Log Settings DCNM-LAN configuring the default logging level description services modules replacing SFPs not present reason codes SNMP preferences
C-1 10-14
10-13
IN-11
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
deleting a collection
25-5 25-5 25-6
replacing syslog
10-14 6-8
deleting data from the statistics database purging data automatically purging data now Statistics tab Statistics tab DCNM-LAN stopping and starting monitoring storage devices performance statistics summary reports description
2-6 7-1 14-12 14-12 25-3 25-8
selecting for supervisor modules SYSTEM variable system messages viewing using Device Manager viewing with Events tab
10-13 2-14 10-1
8-4
Supervisor-1 modules migrating from Supervisor-2 modules (note) selecting software images Supervisor-2 modules Generation 1 chassis select software images supervisor modules managing standby bootflash: replacing
10-12, 10-14 10-14 10-13 10-13 10-13 to ?? 10-14 10-13 to ?? 10-5
T
tables filtering navigating templates creating for custom reports terminals configuring settings thresholds baselines for performance time delays setting topologies clearing maps mapping Topology
8-3 11-22 B-2 11-18 7-3 B-1 2-31 2-10 2-10 2-11
standby supervisor boot variable version upgrading a dual supervisor switch viewing using Device Manager suspendedByMode tooltip suspendedBySpeed tooltip suspendedByWWN tooltip swFailure tooltip switches starting up Switch Groups
B-1 B-1 11-18 11-18 11-18 11-18 6-8 B-1
tooManyInvalidFLOGIs tooltip
accessing DCNM-SAN accessing Fabric Path accessing other features collapsing a device group
switching modules
Cisco DCNM Fundamentals Guide, Release 6.x
IN-12
OL-25174-02
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
copy running-config to startup-config creating a device group deleting a device group description
19-1 19-18 19-22 19-19 19-22 19-21
launching DCNM-SAN Web Services UNIX issues parent menus disappear too many open files error upgradeInProgress tooltip
11-12 11-12
2-7
expanding a device group exporting as JPG image hiding device groups hiding network servers layouts legend
19-5 19-10 19-15, 19-16 19-28 19-18
11-12
19-17
upgrades. See disruptive upgrades; nondisruptive upgrades; software upgrades upgrading switches
B-1
removing a device from a device group showing device groups showing network servers using viewing tools views
19-2 19-29 19-12 19-18 19-17 19-10
19-20
V
virtual server
8-4 2-76
vPC configuration inconsistency topology map mapping multiple fabrics topology maps custom
8-3 8-3 8-3 11-18 2-44
description enclosures
vPC Inconsistencies vPC inconsistency vPC Utilization vsanInactive tooltip VSANs flow statistics
6-8 2-44
11-18 11-18
vsanMismatchIsolation tooltip
5-33 7-3 C-2
mismatches wizard
5-32
U
UNIX
W
Windows
Cisco DCNM Fundamentals Guide, Release 6.x
OL-25174-02
IN-13
Index
Se n d c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m
DCNM-SANServer Windows issues blue screen
11-11 11-11 11-11 3-1
DCNM-SAN window content disappears icons disappear from desktop SCP/SFTP failures Windows XP hangs wizards DPVM Wizard FCIP Wizard FCoE Wizard IP ACL Wizard iSCSI Wizard IVR Zone Wizard NPV Wizard
5-33 5-33 5-33 5-33 5-33 5-32 5-33 5-33 5-32 5-33 11-11 11-10 11-11 11-11
Device Manager window content disappears printing causes an application crash text fields are too small
11-11
License Install Wizard PortChannel Wizard Port Security Wizard QoS Wizard VSAN Wizard WWNs suspended connection
5-33
5-33
5-32
C-2
Z
zoneMergeFailureIsolation tooltip zoneRemoteNoRespIsolation tooltip zones displayed as bold wizard zoning FabricWare support
D-1 5-32 11-9 5-33 11-18 11-18
troubleshooting tools
IN-14
OL-25174-02