Sys MGMNT
Sys MGMNT
April, 2015
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Events 4-1
Inventory 4-1
SPAN 4-2
LLDP 4-2
Prerequisites 5-2
Feature History for the Event Browser and Events Tabs 5-12
Prerequisites 6-3
Prerequisites 7-4
Prerequisites 8-4
Prerequisites 9-3
Prerequisites 10-4
Prerequisites 11-27
Configuration Delivery for Templates: OTV Multicast with VRRP Isolation Template 12-88
Configuration Delivery for Templates: OTV Unicast with One Adjacency Server Template 12-89
Configuration Delivery for Templates: OTV Unicast with One Adjacency Server and HSRP Isolation
Template 12-89
Configuration Delivery for Templates: OTV Unicast with One Adjacency Server and VRRP Isolation
Template 12-89
Configuration Delivery for Templates: OTV Unicast with Two Adjacency Servers Template 12-90
Configuration Delivery for Templates: OTV Unicast with Two Adjacency Servers and HSRP Isolation
Template 12-90
Configuration Delivery for Templates: OTV Unicast with Two Adjacency Servers and VRRP Isolation
Template 12-91
Configuration Delivery for Templates: Virtual Port Channel Template 12-91
Configuration Delivery for Templates: Zone Template 12-93
Additional References 12-93
Related Documents 12-93
Standards 12-94
Feature History for Configuration Delivery Management 12-94
INDEX
This preface describes the audience, organization, and conventions of the Cisco DCNM Installation
Guide, Release 7.1.x. It also provides information on how to obtain related documentation.
This preface includes the following sections:
• Audience, page 17
• Document Organization, page 17
• Document Conventions, page 18
• Related Documentation, page 18
• Related Documentation, page 18
• Obtaining Documentation and Submitting a Service Request, page 20
Audience
This publication is for experienced network administrators who configure and maintain Cisco DCNM.
Document Organization
This document is organized into the following chapters:
Chapter Description
Chapter 4, “Overview” Provides an overview of the features in this
document.
Chapter 5, “Managing Events” Describes how to use the Event Browser and
feature-specific Events tabs.
Chapter 6, “Working with Inventory” Describes how to use the Inventory feature.
Chapter 7, “Managing Virtual Switches” Describes how to manage virtual switches.
Chapter 8, “Configuring SPAN” Describes how to use the Switched Port
Analyzer (SPAN) feature.
Chapter 9, “Configuring LLDP” Describes how to configure Link Layer
Discovery Protocol (LLDP).
Chapter Description
Chapter 10, “Managing Device Operating Systems” Describes how to use the Device OS
Management feature.
Chapter 11, “Working with Configuration Change Describes how to use the Configuration Change
Management” Management feature.
Chapter 12, “Using Configuration Delivery Describes how to use the Configuration
Management” Delivery Management feature.
Document Conventions
This document uses the following conventions:
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Related Documentation
This section contains information about the documentation available for Cisco DCNM and for the
platforms that Cisco DCNM manages.
This section includes the following topics:
• Cisco DCNM Documentation, page 18
• Cisco Nexus 1000V Series Switch Documentation, page 19
• Cisco Nexus 2000 Series Fabric Extender Documentation, page 19
• Cisco Nexus 3000 Series Switch Documentation, page 20
• Cisco Nexus 4000 Series Switch Documentation, page 20
• Cisco Nexus 5000 Series Switch Documentation, page 20
• Cisco Nexus 7000 Series Switch Documentation, page 20
Release Notes
Cisco DCNM
The following publications support both Cisco DCNM for LAN and DCNM for SAN, and address the
new licensing model, the new installation process, and the new features of Cisco DCNM:
• Cisco DCNM Fundamentals Guide, Release 6.x
• Cisco DCNM Installation Guide, Release 6.x
http://www.cisco.com/en/US/products/ps10110/tsd_products_support_series_home.html
As of Cisco DCNM Release 5.2, Cisco Fabric Manager and Cisco Data Center Network Manager for
LAN are merged into one unified product called Cisco Data Center Network Manager (DCNM) that can
manage both LAN and SAN environments. As a part of this product merger, the name Cisco DCNM for
SAN replaces the name Cisco Fabric Manager.
The following documentation changes support the merged Cisco DCNM product:
• Cisco DCNM product documentation for Cisco DCNM Release 5.2 is retitled with the name Cisco
DCNM for LAN.
• Cisco Fabric Manager product documentation for Cisco DCNM Release 5.2 is retitled with the name
Cisco DCNM for SAN.
• Cisco DCNM for SAN product documentation is now published to the Data Center Network
Manager listing page on Cisco.com:
http://www.cisco.com/en/US/products/ps9369/tsd_products_support_configure.html
This URL is also the listing page for Cisco DCNM for LAN product documentation.
• Cisco Fabric Manager documentation for software releases earlier than Cisco DCNM Release 5.2,
retains the name Cisco Fabric Manager and remains available at its current Cisco.com listing page:
http://www.cisco.com/en/US/products/ps10495/tsd_products_support_configure.html
You should continue to use the Cisco Fabric Manager documentation if you are using a release of
Cisco Fabric Manager software that is earlier than Cisco DCNM Release 5.2.
• The name DCNM-SAN is used in place of Cisco DCNM for SAN in the user interface of Cisco Data
Center Network Manager; likewise, the name DCNM-LAN is used in place of Cisco DCNM for
LAN in the user interface. To match the user interface, the product documentation also uses the
names DCNM-SAN and DCNM-LAN.
• The following new publications support both Cisco DCNM for LAN and DCNM for SAN, and
address the new licensing model, the new installation process, and the new features of Cisco DCNM:
– Cisco DCNM Installation and Licensing Guide
– Cisco DCNM Release Notes
For a complete list of Cisco DCNM documentation, see the “Related Documentation” section in the
Preface.
This chapter provides release-specific information for each new and changed feature in the Cisco DCNM
Installation Guide, Release 7.1.x. The latest version of this document is available at the following Cisco
website:
http://www.cisco.com/en/US/products/ps9369/tsd_products_support_series_home.html
To check for additional information about Cisco Data Center Network Manager (DCNM) Release 5.2(1),
see the Cisco DCNM Release Notes, Release 7.x.
Table 1 summarizes the new and changed features for the Cisco DCNM Installation Guide, Release
7.1.x, and tells you where they are documented.
Changed
in
Feature Description Release Where Documented
Configuration Delivery Beginning with Cisco DCNM Release 6.1(1), you 6.1(1) Chapter 12, “Using Configuration
Template can create templates for use with Delivery Management.”
template-sourced jobs.
Configuration Change Support was extended to the Cisco Nexus 3000 5.2(1) Chapter 11, “Working with
Management Series switches. Configuration Change
Management”
Configuration Delivery Configuration delivery templates were enhanced 5.2(1) Chapter 12, “Using Configuration
Management - Template in the Cisco DCNM client. Delivery Management”
enhancements
Inventory Support was extended to the Cisco Nexus 3000 5.2(1) Chapter 6, “Working with
Series switches. Inventory”
Line Card Reload You can individually restart any line card in the 5.2(1) Chapter 6, “Working with
device without affecting the operational state of Inventory”
other components in the switch.
Module Pre-provisioning You can pre-provision a new module or a module 5.2(1) Chapter 6, “Working with
that is present on the switch but is in a offline Inventory”
state. This feature is only supported on the Cisco
5000 Series platform.
SPAN Support was extended to the Cisco Nexus 3000 5.2(1) Chapter 6, “Working with
Series switches. Inventory”
Switch Profiles Support was extended for the Cisco Nexus 5000 5.2(1) Chapter 11, “Working with
Series switches. Configuration Change
Management”
Configuration Delivery Configuration delivery templates are supported in 5.1(1) Chapter 12, “Using Configuration
Management the Cisco DCNM client. Delivery Management”
LLDP You can configure Link Layer Discovery Protocol 5.1(1) Chapter 9, “Configuring LLDP”
(LLDP) on individual interfaces on Cisco Nexus
5000 Series switches.
Configuration Change Support was extended to all managed Cisco 5.0(2) Chapter 11, “Working with
Management Nexus Series switches. Configuration Change
Management”
Configuration Delivery This feature was introduced. 5.0(2) Chapter 12, “Using Configuration
Management Delivery Management”
Device OS Management Support was added for Cisco Nexus 4000 Series 5.0(2) Chapter 10, “Managing Device
switches and Cisco Nexus 5000 Series switches. Operating Systems”
Changed
in
Feature Description Release Where Documented
LLDP You can configure Link Layer Discovery Protocol 5.0(2) Chapter 9, “Configuring LLDP”
(LLDP) in order to discover servers connected to
your device.
Power Usage You can display power usage information for 5.0(2) Chapter 6, “Working with
managed Cisco Nexus 7000 Series Switches. Inventory”
Virtual Switches You can configure the virtual switch domain and 5.0(2) Chapter 7, “Managing Virtual
server connections. Switches”
For a complete list of Cisco DCNM documentation, see the “Related Documentation” in the Preface.
This chapter describes the system management features that you can use to monitor and manage a Nexus
environment using the Cisco Data Center Network Manager (DCNM).
This chapter includes the following sections:
• Events, page 4-1
• Inventory, page 4-1
• Virtual Switching, page 4-2
• SPAN, page 4-2
• LLDP, page 4-2
• Managing Device Operating Systems, page 4-2
• Configuration Change Management, page 4-2
• Configuration Delivery Management, page 4-2
Events
The Event Browser and feature-specific Events tabs in Cisco DCNM enable you to view and manage
recent status events. Events include status-related system messages that Cisco DCNM retrieves from
managed devices and messages generated by the Cisco DCNM server.
Inventory
The Inventory feature displays information about the components that comprise a selected managed
device and power usage information for managed Cisco Nexus 7000 Series Switches. For information,
see Chapter 6, “Working with Inventory.”
In addition, the Inventory feature allows you to configure fundamental system parameters on virtual
switches, such as the Cisco Nexus 1000V Series Switch. For information, see Chapter 7, “Managing
Virtual Switches.”
Virtual Switching
Cisco DCNM can be used to manage and display information about virtual switches, such as the Cisco
Nexus 1000V Series switch, in your network. Managing a virtual switch involves configuring its domain
and server connection.
SPAN
The switched port analyzer (SPAN) feature analyzes traffic between source ports on Cisco NX-OS
devices. It operates by directing the SPAN session traffic to a destination port with an external analyzer
attached to it. The sources and destinations to be monitored in SPAN sessions can be configured on the
local device.
LLDP
Link Layer Discovery Protocol (LLDP) is a vendor-neutral, one-way device discovery protocol that
allows network devices to advertise information about themselves to other devices on the network. This
protocol runs over the data-link layer, which allows two systems running different network layer
protocols to learn about each other. LLDP can be enabled globally or per interface.
DCNM allows you to view and manage events that the DCNM server recently received from managed
devices or that the DCNM server generated itself. The Event Browser allows you to view recent status
events. In addition to listing events, the Event Browser provides a pie chart and a bar chart of events
separated by the event severity.
DCNM also displays feature-specific status events on the Events tab that appears in the Details pane for
features that can have events.
This chapter describes how to use the Event Browser and feature-specific Events tabs in Cisco Data
Center Network Manager (DCNM).
This chapter includes the following sections:
• Information About Events, page 5-1
• Licensing Requirements for the Event Browser, page 5-2
• Prerequisites, page 5-2
• Guidelines and Limitations for the Event Browser, page 5-2
• Platform Support, page 5-3
• Using the Event Browser and Events Tabs, page 5-3
• Field Descriptions for Events, page 5-10
• Related Documents, page 5-12
• Feature History for the Event Browser and Events Tabs, page 5-12
In the Event Browser and on Events tabs, you can change the status of an event, add notes to an event,
or delete an event.
In addition, the Event Browser provides a pie chart and a bar chart of events separated by the event
severity. You can also delete individual events from the events database.
Note Configuring Cisco DCNM server log settings does not affect logging levels on managed Cisco NX-OS
devices.
Prerequisites
The following prerequisites are required for using the Events feature on Cisco DCNM. For a full list of
feature-specific prerequisites, see the platform-specific documentation:
• System-message logging levels for the Events feature must meet or exceed Cisco DCNM
requirements. During device discovery, Cisco DCNM detects inadequate logging levels and raises
them to the minimum requirements. Cisco Nexus 7000 Series switches that run Cisco NX-OS
Release 4.0 are an exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the
command-line interface to configure logging levels to meet or exceed Cisco DCNM requirements.
For more information, see the Fundamentals Configuration Guide, Cisco DCNM for LAN, Release
5.x .
• Managed Cisco NX-OS devices must be configured to send system messages to the Cisco DCNM
server.
• The Event Browser can display up to 2000 events. The events database is limited by the amount of
space available to the database.
• You cannot use Cisco DCNM to control the logging levels of managed Cisco NX-OS devices. For
more information, see the Fundamentals Configuration Guide, Cisco DCNM for LAN, Release 5.x .
• We recommend that you delete events that you no longer need or that you have resolved. For
information about deleting old events from the events database, see the Fundamentals Configuration
Guide, Cisco DCNM for LAN, Release 5.x .
Platform Support
The following platforms support this feature but may implement it differently. For platform-specific
information, including guidelines and limitations, system defaults, and configuration limits, see the
corresponding documentation.
Platform Documentation
Cisco Nexus 1000V Series switches Cisco Nexus 1000V Series Switches Documentation
Cisco Nexus 2000 Series Fabric Extender Cisco Nexus 2000 Series Fabric Extender Documentation
Cisco Nexus 4000 Series switches Cisco Nexus 4000 Series Switches Documentation
Cisco Nexus 5000 Series switches Cisco Nexus 5000 Series Switches Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switches Documentation
DETAILED STEPS
Step 2 (Optional) If you want to change the summary chart that appears above the Feature Selector, choose one
of the following Chart Type options, as needed:
• Bar Chart
• Pie Chart
The colors of the chart correspond to event severity levels, as indicated in the legend that appears above
the chart.
Step 3 (Optional) If you want to sort or filter events, you can use one or more of the filtering features as
described in the following table:
Step 4 (Optional) If you want to view details about a specific event, follow these steps:
a. Find the event in the event list.
b. Click the event.
c. Expand the Details pane, if necessary.
Details about the selected event appear in the Details pane.
d. (Optional) To read notes and messages about status changes to the event, read the information in the
Action Log field.
RELATED TOPICS
Note When you apply an event filter, the Events tab continues to display events when the Cisco DCNM server
receives them. The filter criteria that you select only affect the Filtered Events tab.
If the message “Filter Applied” appears at the top of the Contents pane, the Cisco DCNM client is
applying an event filter to the Event Browser.
DETAILED STEPS
Step 1 View events in the Event Browser (see the “Viewing the Event Browser” section on page 5-3).
Step 2 If you want to apply an event filter, follow these steps:
a. From the menu bar, choose View > Event Filter.
b. Check the Apply Filter check box.
c. Configure the filter criteria.
d. Click OK.
A Filtered Events tab appears in the Event Browser. The tab displays the events that match the filtering
criteria that you specified. The message “Filter Applied” appears at the top of the Contents pane.
Step 3 If you want to remove an event filter, follow these steps:
a. From the menu bar, choose View > Event Filter.
b. Uncheck the Apply Filter check box.
c. Click OK.
The Filtered Events tab disappears. No message appears at the top of the Contents pane.
RELATED TOPICS
Typically, the Events tab appears when, in the Summary pane, you select an object that can have events
associated with it. For example, if you select Interfaces > Physical > Ethernet from the Feature Selector
pane, the Summary pane displays devices. Devices contain slots, and slots contain Ethernet ports. When
you select a device, slot, or port, the Details pane displays an Events tab.
What you select in the Summary pane affects which events are shown in the tab. Continuing the Ethernet
interface example, the scope of the events in the Events tab depends on what you select, as follows:
• Device—Events that pertain to the selected device, any slot within the device, and any Ethernet
interface within the slot.
• Slot—Events that pertain to the selected slot and to any Ethernet interface within the slot.
• Port—Events that pertain to the selected Ethernet interface.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose the feature for which you want to view events.
For example, choose Interfaces > Physical > Ethernet.
Step 2 From the Summary pane, select an object.
The Events tab appears in the Details pane. In the Events tab, the events table appears.
Note If no Events tab appears, Cisco DCNM cannot display events for the object that you selected.
Step 3 (Optional) If you want to sort or filter events, you can use one or more of the filtering features as
described in the following table:
Step 4 (Optional) If you want to view details about a specific event, follow these steps:
a. Find the event in the event list.
b. Click the event.
c. Expand the Details pane, if necessary.
Details about the selected event appear in the Details pane.
d. (Optional) To read notes and messages about status changes to the event, read the information in the
Action Log field.
RELATED TOPICS
Select an event in the Event Browser or on an Events tab for a specific feature. For more information,
see the “Viewing the Event Browser” section on page 5-3 or the “Viewing Events on an Events Tab”
section on page 5-7.
DETAILED STEPS
RELATED TOPICS
Find the events to which you want to add a note. For more information, see the “Viewing the Event
Browser” section on page 5-3 or the “Viewing Events on an Events Tab” section on page 5-7.
DETAILED STEPS
RELATED TOPICS
Deleting an Event
You can delete one or more events from the Event Browser or a feature-specific Events tab. A deleted
event no longer appears in the Event Browser or on a feature-specific Events tab; however, the event
remains in the events database.
For information about deleting old events from the events database, see the Fundamentals Configuration
Guide, Cisco DCNM for LAN, Release 5.x .
Select an event in the Event Browser or on an Events tab for a specific feature. For more information,
see the “Viewing the Event Browser” section on page 5-3 or the “Viewing Events on an Events Tab”
section on page 5-7.
DETAILED STEPS
Step 1 In the event table, select one or more events that you want to delete.
Note To select more than one event, you can click and drag across the events or you can press and hold
Ctrl and click each event.
RELATED TOPICS
Events Table
The events table appears in the Event Browser and on feature-specific Events tabs.
Field Description
Device Display only. Name and IP address of the device that the event is related to.
Source Display only. Where the event message originated. Sources are either a
feature on a managed Cisco NX-OS device or the Cisco DCNM server.
Field Description
Feature Display only. Name of the Cisco NX-OS or Cisco DCNM server feature that
the event pertains to.
Time Display only. Date and time that the event occurred.
Severity Display only. Severity of the event. Possible severities are as follows:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notification
• Informational
• Debug
Message Display only. Text of the event.
Annotation Status of the event. Possible statuses are as follows:
• Open—The default status of an event. You cannot assign an event the
status of Open.
• Acknowledged
• Closed
Event Details
Event details appear below the events table in the Event Browser and on feature-specific Events tabs.
Field Description
Event Type Display only. Type of the event. Event types are categories that describe the
general nature of the event. Possible event types are as follows:
• Communication
• Environmental
• Equipment
• Processing Error
• Quality of Service
• Security
• Unknown
Action Log Shows all actions taken on the event and all notes added to the event.
Field Description
Life Cycle Type Display only. Type of life cycle of the event. Possible life cycle types are as
follows:
• State Change
• Attribute Value Change
• Instance Creation
• Instance Deletion
• Informational
Related Documents
Related Topic Document Title
Minimum required Cisco NX-OS logging levels Fundamentals Configuration Guide, Cisco DCNM for LAN, Release
5.x
Cisco DCNM server log settings Fundamentals Configuration Guide, Cisco DCNM for LAN, Release
5.x
Deleting events from the events database Fundamentals Configuration Guide, Cisco DCNM for LAN, Release
5.x
Cisco NX-OS system messages Cisco NX-OS System Messages Reference
Table 5-3 Feature History for the Event Browser and Events Tabs
This chapter describes how to use the Inventory feature in Cisco Data Center Network Manager
(DCNM).
This chapter includes the following sections:
• Information About Inventory, page 6-1
• Licensing Requirements for Inventory, page 6-3
• Prerequisites, page 6-3
• Platform Support, page 6-3
• Configuring Module Pre-Provisioning, page 6-4
• Reloading a Line Card, page 6-5
• Displaying Inventory Information, page 6-6
• Displaying Power Usage Information, page 6-9
• Field Descriptions, page 6-10
• Feature History for Inventory, page 6-12
Understanding Inventory
The Inventory feature displays summary and detailed information about the chassis, modules, fan trays,
and power supplies for managed devices.
Module Pre-Provisioning
Note This feature is supported only on the Cisco Nexus 5000 Series switches.
The pre-provisioning feature allows you to preconfigure interfaces before inserting or attaching a
module to a Cisco Nexus 5000 Series switch. If a module goes offline, you can use pre-provisioning to
make changes to the interface configurations for the offline module. When a pre-provisioned module
comes online, the pre-provisioning configurations are applied. If any configurations were not applied, a
syslog is generated. The syslog lists the configurations that were not accepted.
In some Virtual Port Channel (vPC) topologies, pre-provisioning is required for the configuration
synchronization feature. Pre-provisioning allows you to synchronize the configuration for an interface
that is online with one peer but offline with another peer.
Supported Hardware
The pre-provisioning feature supports the following hardware:
• N2K-C2148T Fabric Extender 48x1G 4x10G Module
• N2K-C2232P Fabric Extender 32x10G Module
• N2K-C2248T Fabric Extender 48x1G 4x10G Module
• N51-M16EP Cisco 16x10-Gigabit Ethernet Expansion Module
• N51-M8E8FP Cisco 8-port 1/2/4/8G FC and 8 Port 10-Gigabit Ethernet Expansion Module
• N5K-M1008 Cisco 8-port Fiber Channel Expansion Module 8 x SFP
• N5K-M1060 Cisco 6-port Fiber Channel Expansion Module 6 x SFP
• N5K-M1404 Expansion Module 4 x 10GBase-T LAN, 4 x Fiber Channel
• N5K-M1600 Cisco 6-port 10-Gigabit Ethernet SFP Module 6 x SFP
Prerequisites
The Inventory feature has the following prerequisite (for a full list of feature-specific prerequisites, see
the platform-specific documentation):
• System-message logging levels for the Inventory feature must meet or exceed Cisco DCNM
requirements. During device discovery, Cisco DCNM detects inadequate logging levels and raises
them to the minimum requirements. Cisco Nexus 7000 Series switches that run Cisco NX-OS
Release 4.0 are an exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the
command-line interface to configure logging levels to meet or exceed Cisco DCNM requirements.
For more information, see the Fundamentals Configuration Guide, Cisco DCNM for LAN, Release
5.x .
Platform Support
The following platforms support this feature but may implement it differently. For platform-specific
information, including guidelines and limitations, system defaults, and configuration limits, see the
corresponding documentation.
Platform Documentation
1
Cisco Nexus 1000V Series switches Cisco Nexus 1000V Series Switch Documentation
Cisco Nexus 3000 Series switches Cisco Nexus 3000 Series Switch Documentation
Platform Documentation
Cisco Nexus 4000 Series switches1 Cisco Nexus 4000 Series Switch Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switch Documentation
1. The power usage feature is supported only on the Cisco Nexus 7000 Series switch.
The module pre-provisioning feature allows you to pre-provision a new module or a module that is
present on the switch but is in a offline state.
This section includes the following topics:
• Pre-Provisioning Offline Modules, page 6-4
• Pre-Provisioning Online Modules, page 6-4
• Pre-Provisioning FEX Modules, page 6-5
Note This feature is supported only on the Cisco Nexus 5000 Series switches.
DETAILED STEPS
Note This feature is supported only on the Cisco Nexus 5000 Series switches.
DETAILED STEPS
Note This feature is supported only on the Cisco Nexus 5000 Series switches.
DETAILED STEPS
Beginning with Cisco DCNM Release 5.2(1), you can individually restart any line card in the device
without affecting the operational state of other components in the switch.
DETAILED STEPS
Step 4 Right-click the card type that you want and choose Reload.
A dialog box appears warning you that after the line card reload, the device will be rediscovered.
Step 5 Click Yes or No to confirm your decision.
DETAILED STEPS
RELATED TOPICS
DETAILED STEPS
RELATED TOPICS
DETAILED STEPS
RELATED TOPICS
DETAILED STEPS
• Events—Displays event information including the source, time, severity, message, and status of the
event. You can display details for each event.
RELATED TOPICS
DETAILED STEPS
To display power usage summary information, from the Feature Selector pane, choose
Inventory > Power Usage. Aggregated power usage information for all managed Cisco Nexus 7000
Series switches and power usage information for each managed device displays in the Summary pane.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Power Usage.
Summary power usage information for the entire network and each managed device displays in the
Summary pane.
Step 2 From the Summary pane, click the entire network or one or more devices.
The Details tab displays graphical details about the power usage for selected devices.
RELATED TOPICS
RELATED TOPICS
Field Descriptions
This section includes the following field descriptions for the Inventory and Power Usage features:
• Inventory: Details: Hardware Section, page 6-10
• Inventory: Details: Software Section, page 6-11
• Inventory: Power Usage, page 6-11
Field Description
Switch Name Hostname assigned to the device.
Description Word or phrase that describes the device.
Field Description
Product ID ID number for the device.
Serial Number Serial number of the device.
Field Description
System Uptime Date and time when the device was last uploaded.
System Image
Image Name Name of the image running on the device.
Location Directory where the system image resides.
Version Version number of the image running on the device.
Kickstart Image
Image Name Name of the kickstart image file.
Location Directory where the kickstart image resides.
Version Version number of the kickstart image file.
Field Description
Name Name of the device group or device.
Total Capacity Total power capacity for all devices in the group or total power capacity of a
(Watts) device.
Total Drawn/Usage Total power used by all devices in the group or total power used by all the
(Watts) modules in a device.
Total Drawn/Usage Percentage of power used by all devices in the group or percentage of power
(%) used by all modules in a device.
Total Allocated Total power allocated for all devices in the group or total power allocated for all
(Watts) the modules in a device.
Total Available Total power available for all devices in the group or total power available for
(Watts) additional modules in a device.
Last Refresh Time Time when the power usage information was last updated in Cisco DCNM.
The Cisco Nexus 1000V is a virtual access software switch that works with VMware vSphere 4.0 and
has the following components:
• Virtual Supervisor Module (VSM)—Control plane of the switch and a virtual machine that runs
Cisco NX-OS.
• Virtual Ethernet Module (VEM) —Virtual line card embedded in each VMware vSphere (ESX) host.
Managing a virtual switch involves configuring its domain and server connections.
A domain is an instance of a Cisco Nexus 1000V Series Switch device, including dual redundant VSMs
and managed VEMs, within a VMware vCenter server. Each domain is distinguished by a unique integer
called the domain identifier.
In order for the Cisco Nexus 1000V to connect to a vCenter Server or an ESX server, you must first
define the connection parameters. All communication with the vCenter Server is secured by the
Transport Layer Security (TLS) protocol.
This chapter describes how to manage virtual switches using Cisco Data Center Network Manager
(DCNM).
This chapter includes the following sections:
• Information About Virtual Switches, page 7-2
• Licensing Requirements for Virtual Switches, page 7-3
• Prerequisites, page 7-4
• Platform Support, page 7-4
• Configuring Domains, page 7-4
• Configuring Server Connections, page 7-9
• Displaying Neighbor Devices, page 7-13
• Configuring a Control Interface, page 7-13
• Monitoring Virtual Switches, page 7-15
• Field Descriptions, page 7-15
• Additional References, page 7-17
• Feature History for Virtual Switches, page 7-18
Domains
A domain is an instance of a Cisco Nexus 1000V device, including dual redundant Virtual Supervisor
Modules (VSMs) and managed Virtual Ethernet Modules (VEMs), within a VMware vCenter Server.
Each domain needs to be distinguished by a unique integer called the domain identifier.
You can configure Layer 2 or Layer 3 transport control mode for communication between the VSM and
VEMs.
This section includes the following topics:
• Layer 2 Control, page 7-2
• Layer 3 Control, page 7-2
Layer 2 Control
Layer 2 is a transport control mode used for communication between the VSM and VEMs. However, you
can create and specify the VLAN to be used.
Layer 3 Control
Layer 3 control, or IP connectivity, is supported between the VSM and VEM for control and packet
traffic. With Layer 3 control, a VSM can be Layer 3 accessible and control hosts can reside in a separate
Layer 2 network. All hosts controlled by a VSM, however, must still reside in the same Layer 2 network.
Because a VSM cannot control a host that is outside of the Layer 2 network it controls, the host on which
it resides must be controlled by another VSM.
Figure 7-1 shows an example of Layer 3 control where VSM0 controls VEM_0_1. VEM_0_1, in turn,
hosts VSM1 and VSM2, and VSM1 and VSM2 control VEMs in other Layer 2 networks.
VEM 1-2
Layer 2 Network A
VM VM VM VM
VSM 1 VSM 2
VEM 1-3
Layer 3 Network
VM VM VM VM
196104
VEM 2-3
Server Connections
The Nexus 1000V device requires a connection to a VMware vCenter server for management of its
distributed virtual switch (DVS) and host mapping to the Virtual Ethernet Modules (VEMs).
Prerequisites
The following prerequisite is required for using the Virtual Switches feature on Cisco DCNM. For a full
list of feature-specific prerequisites, see the platform-specific documentation.
• System-message logging levels for the Virtual Switches feature must meet or exceed Cisco DCNM
requirements. During device discovery, Cisco DCNM detects inadequate logging levels and raises
them to the minimum requirements. Cisco Nexus 7000 Series Switches that run Cisco NX-OS
Release 4.0 are an exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the
command-line interface to configure logging levels to meet or exceed Cisco DCNM requirements.
For more information, see the Fundamentals Configuration Guide, Cisco DCNM for LAN, Release
5.x .
Platform Support
The following platform supports this feature. For platform-specific information, including guidelines
and limitations, system defaults, and configuration limits, see the corresponding documentation.
Platform Documentation
Cisco Nexus 1000V Series Switches Cisco Nexus 1000V Series Switch Documentation
Configuring Domains
You can configure domains in Andiamo 9500.
This section includes the following topics:
• Creating a Domain with Layer 2 Control, page 7-4
• Creating a Domain with Layer 3 Control, page 7-5
• Changing a Domain to Layer 3 Control, page 7-6
• Changing a Domain to Layer 2 Control, page 7-7
• Configuring a Domain with a Control VLAN, page 7-8
• Configuring a Domain with a Packet VLAN, page 7-8
Be aware that if two or more VSMs share the same control and/or packet VLAN, the domain helps
identify the VEMs that are managed by each VSM.
You must have a unique domain ID for this instance.
We recommend that you use one VLAN for control traffic and a different VLAN for packet traffic.
We recommend that you use a distinct VLAN for each domain.
For information about changing a domain ID after adding a second VSM, see the documentation for your
platform.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the device for which you want to create a domain.
Step 3 From the Details pane, choose the Details tab.
Step 4 Expand the Domain Settings section.
Step 5 (Optional) From the menu bar, choose Actions > Reset Domain Setting(s).
Step 6 In the Domain ID field, enter an ID number for the domain.
Step 7 In the Control mode drop-down list, choose L2.
Layer 2 control uses VLAN 1 for the control and packet VLANs by default. If desired, you can configure
specific control and packet VLANs for the domain. See the “Configuring a Domain with a Control
VLAN” section on page 7-8 and the “Configuring a Domain with a Packet VLAN” section on page 7-8.
Step 8 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Configure the interface that you plan to use (mgmt 0 or control 0) with an IP address. For more
information, see the “Configuring a Control Interface” section on page 7-13.
Configure a port profile for Layer 3 control. See the Interfaces Configuration Guide, Cisco DCNM for
LAN, Release 6.x.
Create a VMware kernel NIC interface on each host and apply the Layer 3 control port profile to it. For
more information, see your VMware documentation.
Ensure that you have a unique domain ID for this instance.
For information about changing a domain ID after adding a second VSM, see the documentation for your
platform.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the device for which you want to create a domain.
Step 3 From the Details pane, choose the Details tab.
Step 4 Expand the Domain Settings section.
Step 5 (Optional) From the menu bar, choose Actions > Reset Domain Setting(s).
Step 6 In the Domain ID field, enter an ID number for the domain.
Step 7 In the Control Interface drop-down list, choose either mgmt0 or control0 as the interface to use.
Step 8 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Configure the interface that you plan to use (mgmt 0 or control 0) with an IP address. For more
information, see the “Configuring a Control Interface” section on page 7-13.
Note You must perform the steps in this procedure in order. The control and packet VLANs must be disabled
before the Layer 3 control can be enabled.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the device for which you want to create a domain.
Step 3 From the Details pane, choose the Details tab.
Step 4 Expand the Domain Settings section.
Step 5 In the Control VLAN field, delete the number of the VLAN that is used as the control VLAN.
Step 6 In the Packet VLAN field, delete the number of the VLAN that is used as the packet VLAN.
Step 7 From the menu bar, choose File > Deploy to apply your changes to the device.
Step 8 In the Control mode drop-down list, choose L3.
Step 9 In the Control Interface drop-down list, choose either mgmt0 or control0 as the interface to use.
Step 10 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Create VLANs to be used as the control and packet VLANs. For information, see the Layer 2 Switching
Configuration Guide, Cisco DCNM for LAN, Release 6.x.
Note You must perform the steps in this procedure in order. Layer 3 control must be disabled before the control
and packet VLANs can be assigned.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the device for which you want to create a domain.
Step 3 From the Details pane, choose the Details tab.
Step 4 Expand the Domain Settings section.
Step 5 In the Control mode drop-down list, choose L2.
Step 6 In the Control VLAN field, enter the number of the VLAN to be used as the control VLAN.
Step 7 In the Packet VLAN field, enter the number of the VLAN to be used as the packet VLAN.
Step 8 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Create the VLAN to be used as the control VLAN. For more information, see the Layer 2 Switching
Configuration Guide, Cisco DCNM for LAN, Release 6.x.
If Layer 3 control is configured on your Virtual Supervisor Module (VSM), you cannot configure your
domain with a control VLAN. You must first disable Layer 3 control.
Configure and enable the required VLAN interface using the Cisco Nexus 1000V Interface
Configuration Guide, Release 4.0(4)SV1(2). The VLAN interface provides communication between
VLANs.
Understand how VLANs are numbered. For more information, see the Layer 2 Switching Configuration
Guide, Cisco DCNM for LAN, Release 6.x.
Be aware that newly created VLANs remain unused until Layer 2 ports are assigned to them.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the device for which you want to create a domain.
Step 3 From the Details pane, choose the Details tab.
Step 4 Expand the Domain Settings section.
Step 5 In the Control mode drop-down list, choose Layer 2.
Step 6 In the Control VLAN field, enter the number of the VLAN to be used as the control VLAN.
Step 7 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Create the VLAN to be used as the packet VLAN. For more information, see the documentation for your
platform.
Configure and enable the required VLAN interface using the Cisco Nexus 1000V Interface
Configuration Guide, Release 4.0(4)SV1(2). The VLAN interface provides communication between
VLANs.
Understand how VLANs are numbered. For more information, see the Layer 2 Switching Configuration
Guide, Cisco DCNM for LAN, Release 6.x.
Be aware that newly created VLANs remain unused until Layer 2 ports are assigned to them.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the device for which you want to create a domain.
Step 3 From the Details pane, choose the Details tab.
Step 4 Expand the Domain Settings section.
Step 5 In the Control mode drop-down list, choose L2.
Step 6 In the Packet VLAN field, enter the number of the VLAN to be used as the packet VLAN.
Step 7 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the device for which you want to configure the vCenter Server
connection.
Step 3 From the Details pane, choose the Details tab.
Step 4 Expand the Connection Settings section.
Step 5 In the Connection Name field, enter a name for the connection.
Step 6 In the Server Name/IP Address field, enter either the hostname of the server or its IP address.
Step 7 In the Data Center Name field, enter the data center name in the vCenter Server where the data center is
to be created as a Distributed Virtual Switch (DVS).
Step 8 In the Protocol drop-down list, choose VMWARE-VIM.
Step 9 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
You can disconnect from the vCenter Server, for example, after correcting a vCenter Server
configuration.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the desired device.
Step 3 From the menu bar, choose Actions > Delete Connection.
Step 4 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
DETAILED PROCEDURE
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the desired device.
Step 3 From the menu bar, choose Actions > Connect to vCenter.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the desired device.
Step 3 From the menu bar, choose Actions > Disconnect from vCenter.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the desired device.
Step 3 From the menu bar, choose Actions > Delete VMware DVS.
Step 4 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Note This function can be performed only on disabled modules in the Absent state.
DETAILED STEPS
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the desired device.
Step 3 Expand the Neighbors section.
The neighboring devices appear.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose the desired device.
Step 3 Expand the Control Interface section.
Step 4 In the IP Address field, enter the IP address of the interface to use for Layer 3 control.
Step 5 In the Wildcard Mask field, enter the wildcard mask.
Step 6 In the Admin Status drop-down list, choose Up to enable the interface.
Step 7 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Inventory > Virtual Switch.
Summary information for each managed virtual switch appears in the Summary pane.
Step 2 From the Summary pane, choose a device to display additional details about the domain, server,
neighboring devices, and control interface and to display events.
RELATED TOPICS
Field Descriptions
This section includes the following field descriptions for the Virtual Switches feature:
• Inventory: Virtual Switch: Details: Domain Settings Section, page 7-16
• Inventory: Virtual Switch: Details: Connection Settings Section, page 7-16
• Inventory: Virtual Switch: Details: Neighbors Section, page 7-17
• Inventory: Virtual Switch: Details: Control Interface Section, page 7-17
Field Description
Domain ID ID number for the domain.
Sync Status Status of the configuration synchronization with the vCenter Server.
Control Mode Control mode for the domain. Valid choices are Layer 2 or Layer 3.
Control Interface Active only if the control mode is Layer 3. Layer 3 interface that is used by the
Virtual Supervisor Module (VSM) for control and packet traffic.
Control VLAN ID number of the VLAN that is used for the control traffic.
Packet VLAN ID number of the VLAN that is used for the packet traffic.
Field Description
Connection Name Name of the connection.
Server Name/IP Hostname or IP address of the vCenter Server.
Address
Data Center Name Name of the data center in the vCenter Server where the data center is to be
created as a Distributed Virtual Switch (DVS).
Config Status Status of the configuration. Valid choices are Enabled or Disabled.
Certificate File name of the digital certificate that is used for the connection.
Filename
Version Version on the VMware vCenter Server.
Protocol Protocol that is used to establish the session with the vCenter Server. Valid
choices are VMWARE VIM or EMPTY.
Port Number TCP port that is used to connect to the vCenter server.
DVS UUID Universally unique identifier (UUID) of the Distributed Virtual Switch (DVS).
Oper Status Status of the connection.
Sync Status Status of the configuration synchronization with the vCenter Server.
Field Description
Last Updated Time Time when the information was last retrieved from the switch. Click Get Latest
Info to retrieve the latest information from the switch.
Source MAC Display only. MAC source addresses of the frames received.
Address
Type Display only. Setting that indicates whether the neighbor node is a VSM or VEM.
Domain ID Display only. Numerical identifier of the domain.
Node ID Display only. Numerical identifier of the neighbor node.
Last Learnt Time Display only. Last time that the MAC address was learned.
Field Description
IP Address IP address of the control interface.
Wildcard Mask Wildcard mask of the control interface.
Admin Status Administrative status of the control interface. Valid choices are Up or Down.
Operation Status Current operational status, either Up or Down.
Additional References
For additional information related to implementing virtual switches, see the following sections:
• Related Documents, page 7-17
• Standards, page 7-18
Related Documents
Related Topic Document Title
Configuring the Domain Cisco Nexus 1000V System Management Configuration Guide,
Release 4.0(4)SV1(2)
Managing Server Connections Cisco Nexus 1000V System Management Configuration Guide,
Release 4.0(4)SV1(2)
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
This chapter describes how to configure an Ethernet Switched Port Analyzer (SPAN) to analyze traffic
between ports on Cisco NX-OS devices.
You can configure an Ethernet switched port analyzer (SPAN) to monitor traffic in and out of your
device.
Note System-message logging levels for the SPAN feature must meet or exceed Cisco DCNM requirements.
During device discovery, Cisco DCNM detects inadequate logging levels and raises them to the
minimum requirements. Cisco Nexus 7000 Series switches that run Cisco NX-OS Release 4.0 are an
exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the command-line interface to
configure logging levels to meet or exceed Cisco DCNM requirements. For more information, see the
Fundamentals Configuration Guide, Cisco DCNM for LAN, Release 5.x
Note The Cisco NX-OS release that is running on a managed device may not support all the features or settings
described in this chaptersection. For the latest feature information and caveats, see the documentation
and release notes for your platform and software release.
SPAN Sources
The interfaces from which traffic can be monitored are called SPAN sources. Sources designate the
traffic to monitor and whether to copy ingress, egress, or both directions of traffic. SPAN sources include
the following:
• Ethernet ports
• VLANs—When a VLAN is specified as a SPAN source, all supported interfaces in the VLAN are
SPAN sources.
• Remote SPAN (RSPAN) VLANs
• The inband interface to the control plane CPU—You can monitor the inband interface only from the
default VDC. Inband traffic from all VDCs is monitored.
SPAN Destinations
SPAN destinations refer to the interfaces that monitor source ports. Destination ports receive the copied
traffic from SPAN sources.
SPAN Sessions
You can create SPAN sessions designating sources and destinations to monitor.
Figure 8-1 shows a SPAN configuration. Packets on three Ethernet ports are copied to destination port
Ethernet 2/5. Only traffic in the direction specified is copied.
186283
E 2/3 Tx
Network analyzer
Note Virtual SPAN sessions cause all source packets to be copied to all destinations, whether the packets are
required at the destination or not. VLAN traffic filtering occurs at the egress destination port level.
E 2/5
Source Traffic Destination
VLAN Direction Ports
E 2/6
10 Rx E 2/5
Network analyzer
E 2/7 E 2/6
VLAN 11 11 Rx, Tx
E 2/7
186284
12 Tx
Rx is ingress
Network analyzer Tx is egress
VLAN 12
For information about configuring a virtual SPAN session, see the “Configuring a Virtual SPAN Session”
section on page 8-11.
For information about shutting down SPAN sessions, see the “Shutting Down or Resuming a SPAN
Session” section on page 8-16.
High Availability
The SPAN feature supports stateless and stateful restarts. After a reboot or supervisor switchover,
applies the running configuration.
Virtualization Support
A virtual device context (VDC) is a logical representation of a set of system resources. SPAN applies
only to the VDC where the commands are entered.
For information about configuring VDCs, see the Cisco Nexus 7000 Series NX-OS Virtual Device
Context Configuration Guide, Release 5.x.
For information about configuring VDCs, see the Virtual Device Context Configuration Guide, Cisco
DCNM for LAN, Release 6.x.
Prerequisites
The SPAN feature has the following prerequisite (for a full list of feature-specific prerequisites, see the
platform-specific documentation):
• System-message logging levels for the SPAN feature must meet or exceed Cisco DCNM
requirements. During device discovery, Cisco DCNM detects inadequate logging levels and raises
them to the minimum requirements. Cisco Nexus 7000 Series switches that run Cisco NX-OS
Release 4.0 are an exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the
command-line interface to configure logging levels to meet or exceed Cisco DCNM requirements.
For more information, see the Fundamentals Configuration Guide, Cisco DCNM for LAN, Release
5.x .
Description Limit
Configured SPAN sessions 18
Simultaneously running SPAN sessions 2
Source interfaces per session 128
Source VLANS per session 32
Destination interfaces per session 32
• Although you can define up to 18 SPAN sessions, only two SPAN sessions can be running
simultaneously.
• An RSPAN VLAN can only be used as a SPAN source. It cannot be used as a SPAN destination.
• Destinations for a SPAN session include Ethernet ports or port-channel interfaces in either access
or trunk mode.
• A destination port can be configured in only one SPAN session at a time.
• Destination ports do not participate in any spanning tree instance. SPAN output includes Bridge
Protocol Data Unit (BPDU) Spanning-Tree Protocol hello packets.
• You can configure SPAN destinations to inject packets to disrupt a certain TCP packet stream in
support of the Intrusion Detection System (IDS).
• You can configure SPAN destinations to enable a forwarding engine to learn the MAC address of
the IDS.
• You cannot configure a port as both a source and destination port.
• A single SPAN session can include mixed sources in any combination of the following:
– Ethernet ports
– VLANs
– The inband interface to the control plane CPU
• If you use the supervisor inband interface as a SPAN source, the following packets are monitored:
– All packets that arrive on the supervisor hardware (ingress)
– All packets generated by the supervisor hardware (egress)
• When a SPAN session contains multiple egress source ports, packets that these ports receive may be
replicated even though they are not transmitted on the ports. Some examples of this behavior on
source ports are as follows:
– Traffic that results from flooding
– Broadcast and multicast traffic
• For VLAN SPAN sessions with both ingress and egress configured, two packets (one from ingress
and one from egress) are forwarded from the destination port if the packets get switched on the same
VLAN.
• VLAN SPAN monitors only the traffic that leaves or enters Layer 2 ports in the VLAN.
• You can monitor the inband interface only from the default VDC. Inband traffic from all VDCs is
monitored.
• You can configure a SPAN session on the local device only.
• If you configure a SPAN session to monitor a routed interface, only the received traffic is captured,
even if the session is configured for both directions. This limitation is only for traffic that enters a
Layer 2 interface (with SVI as a Layer 3 interface) and then exits a routed (physical Layer 3)
interface, which is the source of the monitor session. If traffic enters a routed (physical Layer 3)
interface and exits another routed (physical Layer 3) interface, which is the source of the monitor
session, then the destination port of the monitor session captures traffic in both directions. A SPAN
session captures traffic in both directions if traffic entering the routed port is destined to an IP
address (SVI) on the switch.
Platform Support
The following platform supports this feature. For platform-specific information, including guidelines
and limitations, system defaults, and configuration limits, see the corresponding documentation.
Platform Documentation
Cisco Nexus 3000 Series switches Cisco Nexus 3000 Series Switch Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switch Documentation
Default Settings
Table 8-2 lists the default settings for SPAN parameters.
Parameters Default
SPAN sessions Created in the shut state.
Ingress traffic Monitored.
Egress traffic Monitored.
Traffic direction in which packets are copied. Both ingress and egress traffic.
Configuring SPAN
This section includes the following topics:
• Configuring a SPAN Session, page 8-7
• Configuring a Virtual SPAN Session, page 8-11
• Configuring an RSPAN VLAN, page 8-15
• Shutting Down or Resuming a SPAN Session, page 8-16
Note Cisco NX-OS commands for this feature may differ from those in Cisco IOS.
• Make sure that you are in the correct VDC. To switch VDCs, use the switchto vdc command.
You must have already configured the destination ports in access or trunk mode. For more information,
see the Cisco Nexus 7000 Series NX-OS Interfaces Configuration Guide, Release 5.xInterfaces
Configuration Guide, Cisco DCNM for LAN, Release 6.x.
• Configure the destination ports in access or trunk mode.
SUMMARY STEPS
1. config t
2. interface ethernet slot/port[-port]
3. switchport
4. switchport mode [access | trunk | private-vlan]
5. switchport monitor [ingress [learning]]
6. Repeat Steps 2 and 3 to configure monitoring on additional SPAN destinations.
7. no monitor session session-number
8. monitor session session-number
9. description description
10. source {interface type | vlan {number | range} [rx | tx | both]
11. Repeat Step 8 to configure all SPAN sources.
12. filter vlan {number | range}
13. Repeat Step 10 to configure all source VLANs to filter.
14. destination interface type {number | range}
15. Repeat Step 12 to configure all SPAN destination ports.
16. no shut
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Interfaces > Traffic Monitoring > SPAN. The available devices
appear in the Summary pane.
Step 2 From the Summary pane, double-click the device that you want to configure with a SPAN session to
display the configured SPAN sessions.
Step 3 (Optional) To delete a SPAN session that you are no longer using, right-click the SPAN session and
choose Delete.
Step 4 (Optional) To configure a new SPAN session from the menu bar, choose File > New Local SPAN
Session.
a. (Only the first time you create a SPAN session) From the Summary pane, double-click the device
that you want to configure with a SPAN session to display the configured SPAN sessions.
b. (Optional) To modify the session number, from the Summary pane, double-click the Session Id field
and enter a session number from 1 to 18.
Note You can only modify the session number immediately after you create the session.
Step 5 From the Summary pane, choose the SPAN session to configure.
Step 6 From the Details pane, click the Configuration tab and expand the Session Settings section, if
necessary.
Step 7 (Optional) To add a description of the SPAN session, specify it in the Description field.
Step 8 (Optional) In the Filtered VLANs field, click the down arrow to display and choose from the configured
VLANs.
Step 9 Add source Ethernet ports to the SPAN session as follows:
a. From the Ports association panel, double-click the device and then double-click the desired slot to
display ports.
b. Choose the port, right-click on the port row, and choose Add to SPAN Source to add this port to the
SPAN session sources.
Step 10 Add source VLANs or RSPAN VLANs to the SPAN session as follows:
a. From the VLANs association panel, double-click the device to display the configured VLANs.
b. Choose the VLAN, right-click on the VLAN row, and choose Add to SPAN Source to add this
VLAN to the SPAN session sources.
Step 11 Add destination Ethernet ports to the SPAN session as follows:
a. From the Ports association panel, double-click the device and then double-click the desired slot to
display ports.
b. Choose an access or trunk port.
c. In the Monitor column, check the check box to enable monitoring on this port.
d. Right-click on the port row and choose Add to SPAN Destination to add this port to the SPAN
session destinations.
Step 12 (Optional) To modify SPAN session source settings, follow these steps:
a. From the Details pane, click the Configuration tab and expand the Source and Destination
section, if necessary.
b. To modify the ingress or egress choice for a source, check or uncheck the Ingress or Egress check
box to activate the desired direction to monitor.
c. To delete a SPAN source or destination, choose the source or destination entry, right-click on it, and
choose Delete.
Step 13 From the menu bar, choose File > Deploy to apply your changes to the device.
Command Purpose
Step 1 config t Enters global configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet slot/port[-port] Enters interface configuration mode on the selected
slot and port or range of ports.
Example:
switch(config)# interface ethernet 2/5
switch(config-if)#
Step 3 switchport Configures switchport parameters for the selected
slot and port or range of ports.
Example:
switch(config-if)# switchport
switch(config-if)#
Step 4 switchport mode [access | trunk | Configures the switchport mode for the selected slot
private-vlan] and port or range of ports.
Example: • access
switch(config-if)# switchport mode trunk
switch(config-if)# • trunk
• private-vlan
Step 5 switchport monitor [ingress [learning]] Configures the switchport interface as a SPAN
destination.
Example:
switch(config-if)# switchport monitor • ingress
Allows the SPAN destination port to inject
packets that disrupt a certain TCP packet
stream, for example, in networks with IDS.
• ingress learning
Allows the SPAN destination port to inject
packets, and allows the learning of MAC
addresses, for example, the IDS MAC address.
Step 6 (Optional) Repeat Steps 2 and 3 to configure —
monitoring on additional SPAN destinations.
Step 7 no monitor session session-number Clears the configuration of the specified SPAN
session. The new session configuration is added to
Example:
switch(config)# no monitor session 3
the existing session configuration.
Command Purpose
Step 8 monitor session session-number Enters the monitor configuration mode. The new
session configuration is added to the existing session
Example:
switch(config)# monitor session 3
configuration. By default, the session is created in
switch(config-monitor)# the shut state.
Step 9 description description Configures a description for the session. By default,
no description is defined. The description can be up
Example:
switch(config-monitor)# description
to 32 alphanumeric characters.
my_span_session_3
Step 10 source {interface type | vlan Configures sources and the traffic direction in which
{1-3967,4048-4093}} [rx | tx | both] to copy packets. You can enter a range of Ethernet
Example 1:
ports, a port channel, an inband interface, or a range
switch(config-monitor)# source interface of VLANs.
ethernet 2/1-3, ethernet 3/1 rx
You can configure one or more sources, as either a
Example 2: series of comma-separated entries or a range of
switch(config-monitor)# source interface numbers. You can specify up to 128 interfaces. The
port-channel 2 VLAN range is from 1 to 3967 and 4048 to 4093.
Example 3: You can specify the traffic direction to copy as
switch(config-monitor)# source interface ingress (tx), egress (tx), or both. By default, the
sup-eth 0 both direction is both.
Example 4: Note You can monitor the inband interface only
switch(config-monitor)# source vlan 3, 6-8 from the default VDC. The inband traffic
tx from all VDCs is monitored.
Step 11 (Optional) Repeat Step 8 to configure all SPAN —
sources.
Step 12 filter vlan {number | range} Configures which VLANs to select from the
configured sources. You can configure one or more
Example:
switch(config-monitor)# filter vlan 3-5, 7
VLANs, as either a series of comma-separated
entries, or a range of numbers. The VLAN range is
from 1 to 3967 and 4048 to 4093.
Step 13 (Optional) Repeat Step 10 to configure all source —
VLANs to filter.
Step 14 destination interface type {number | Configures destinations for copied source packets.
range} You can configure one or more destinations, as
Example:
either a series of comma-separated entries, or a
switch(config-monitor)# destination range of numbers. You can specify up to 128
interface ethernet 2/5, ethernet 3/7 interfaces.
Note SPAN destination ports must be either
access or trunk ports.
Step 15 (Optional) Repeat Step 12 to configure all SPAN —
destination ports.
Step 16 no shut Enables the SPAN session. By default, the session is
created in the shut state.
Example:
switch(config-monitor)# no shut Note Only two SPAN sessions can be running
simultaneously.
Command Purpose
Step 17 show monitor session {all | session-number (Optional) Displays the SPAN configuration.
| range session-range} [brief]
Example:
switch(config-monitor)# show monitor
session 3
Step 18 copy running-config startup-config (Optional) Copies the running configuration to the
startup configuration.
Example:
switch(config-monitor)# copy
running-config startup-config
RELATED TOPICS
• Ensure that you are in the correct VDC (or use the switchto vdc command).
You have already configured the destination ports in trunk mode. For more information, see the Cisco
Nexus 7000 Series NX-OS Interfaces Configuration Guide, Release 5.xInterfaces Configuration Guide,
Cisco DCNM for LAN, Release 6.x.
• You have already configured the destination ports to monitor a SPAN session with the switchport
monitor command.
SUMMARY STEPS
1. config t
2. no monitor session session-number
3. monitor session session-number
4. source {interface type | vlan} {number | range} [rx | tx | both]
5. Repeat Step 4 to configure all virtual SPAN VLAN sources.
6. destination interface type {number | range}
7. Repeat Step 6 to configure all virtual SPAN destination ports.
8. no shut
9. show monitor session {all | session-number | range session-range} [brief]
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Interfaces > Traffic Monitoring > SPAN. The available devices
appear in the Summary pane.
Step 2 From the Summary pane, double-click the device that you want to configure with a SPAN session to
display the configured SPAN sessions.
Step 3 (Optional) To delete a SPAN session that you are no longer using, right-click the SPAN session and
choose Delete.
Step 4 (Optional) To configure a new SPAN session from the menu bar, choose File > New Local SPAN
Session.
a. (Only the first time you create a SPAN session) From the Summary pane, double-click the device
that you want to configure with a SPAN session to display the configured SPAN sessions.
b. (Optional) To modify the session number, from the Summary pane, double-click the Session Id field
and enter a session number from 1 to 18.
Note You can only modify the session number immediately after you create the session.
Step 5 From the Summary pane, choose the SPAN session to configure.
Step 6 From the Details pane, click the Configuration tab and expand the Session Settings section, if
necessary.
Step 7 (Optional) To add a description of the SPAN session, specify it in the Description field.
Step 8 (Optional) In the Filtered VLANs field, click the down arrow to display and choose from the configured
VLANs.
Step 9 Add source Ethernet ports to the SPAN session as follows:
a. From the Ports association panel, double-click the device and then double-click the desired slot to
display ports.
b. Choose the port, right-click on the port row, and choose Add to SPAN Source to add this port to the
SPAN session sources.
Step 10 Add source VLANs or RSPAN VLANs to the SPAN session as follows:
a. From the VLANs association panel, double-click the device to display the configured VLANs.
b. Choose the VLAN, right-click on the VLAN row, and choose Add to SPAN Source to add this
VLAN to the SPAN session sources.
Step 11 Add destination Ethernet ports to the SPAN session as follows:
a. From the Ports association panel, double-click the device and then double-click the desired slot to
display ports.
Command Purpose
Step 1 config t Enters global configuration mode.
Example:
switch# config t
switch(config)#
Step 2 no monitor session session-number Clears the configuration of the specified SPAN
session. New session configuration is added to the
Example:
switch(config)# no monitor session 3
existing session configuration.
Step 3 monitor session session-number Enters the monitor configuration mode. A new
session configuration is added to the existing session
Example:
switch(config)# monitor session 3
configuration.
switch(config-monitor)#
Step 4 source {interface type | vlan} {number | Configures sources and the traffic direction in which
range} [rx | tx | both] to copy packets. You can configure one or more
Example:
sources, as either a series of comma-separated
switch(config-monitor)# source vlan 3, 6-8 entries, or a range of numbers. You can specify up to
tx 128 interfaces. The VLAN range is from 1 to 3967
and 4048 to 4093.
You can specify the traffic direction to copy as
ingress (tx), egress (tx), or both. By default, the
direction is both.
Step 5 (Optional) Repeat Step 4 to configure all virtual —
SPAN source VLANs.
Command Purpose
Step 6 destination interface type {number | Configures destinations for copied source packets.
range} You can configure one or more interfaces, as either
Example:
a series of comma-separated entries, or a range of
switch(config-monitor)# destination numbers. The allowable range is from 1 to 128.
interface ethernet 2/5, ethernet 3/7
Note Configure destination ports as trunk ports.
For more information, see the Cisco Nexus
7000 Series NX-OS Interfaces Configuration
Guide, Release 5.x.
Step 7 (Optional) Repeat Step 6 to configure all virtual —
SPAN destination ports.
Step 8 no shut Enables the SPAN session. By default, the session is
created in the shut state.
Example:
switch(config-monitor)# no shut Note Only two SPAN sessions can be running
simultaneously.
Step 9 show monitor session {all | session-number (Optional) Displays the virtual SPAN configuration.
| range session-range} [brief]
Example:
switch(config-monitor)# show monitor
session 3
Step 10 interface ethernet slot/port[-port] Enters interface configuration mode on the selected
slot and port or range of ports.
Example:
switch(config)# interface ethernet 2/5
switch(config-if)#
Step 11 switchport trunk allowed vlan {{number | Configures the range of VLANS that are allowed on
range} | add {number | range} | except the interface. You can add to or remove from the
{number | range} | remove {number | range}
| all | none}
existing VLANS, you can select all VLANs except
those you specify, or you can select all or none of the
Example: VLANs. By default, all VLANs are allowed on the
switch(config-if)# switchport trunk interface.
allowed vlan 3-5
You can configure one or more VLANs, as either a
series of comma-separated entries, or a range of
numbers. The VLAN range is from 1 to 3967 and
4048 to 4093.
Step 12 (Optional) Repeat Steps 10 and 11 to configure —
the allowed VLANs on each destination port.
Step 13 show interface ethernet slot/port[-port] (Optional) Displays the interface trunking
trunk configuration for the selected slot and port or range
Example:
of ports.
switch(config-if)# show interface ethernet
2/5 trunk
Step 14 copy running-config startup-config (Optional) Copies the running configuration to the
startup configuration.
Example:
switch(config-if)# copy running-config
startup-config
RELATED TOPICS
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. vlan vlan
3. remote-span
4. exit
5. show vlan
6. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Switching > VLAN. The available devices appear in the
Summary pane.
Step 2 From the Summary pane, double-click the device that you want to configure.
Step 3 Choose the VLAN to configure.
Step 4 From the Details pane, click the VLAN Details tab and expand the Advanced Settings section, if
necessary.
Step 5 Check the RSPAN VLAN check box.
Step 6 From the menu bar, choose File > Deploy to apply your changes to the device.
Command Purpose
Step 1 config t Enters global configuration mode.
Example:
switch# config t
switch(config)#
Step 2 vlan vlan Enters VLAN configuration mode for the VLAN
specified.
Example:
switch(config)# vlan 901
switch(config-vlan)#
Step 3 remote-span Configures the VLAN as an RSPAN VLAN.
Example:
switch(config-vlan)# remote-span
Step 4 exit Exits VLAN configuration mode.
Example:
switch(config-vlan)# exit
switch(config)#
Step 5 show vlan (Optional) Displays the VLAN configuration.
Remote SPAN VLANs are listed together.
Example:
switch(config)# show vlan
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the
startup configuration.
Example:
switch(config)# copy running-config
startup-config
RELATED TOPICS
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. monitor session {session-range | all} shut
3. no monitor session {session-range | all} shut
4. monitor session session-number
5. shut
6. no shut
7. show monitor
8. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Interfaces > Traffic Monitoring > SPAN.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, double-click the device to display the configured SPAN sessions.
Step 3 From the Summary pane, choose the SPAN session to configure.
Step 4 From the Details pane, click the Configuration tab and expand the Session Settings section, if
necessary.
Step 5 Resume (enable) the SPAN session by choosing Up in the Admin Status field.
Step 6 Shut down the SPAN session by choosing Down in the Admin Status field.
Note If a monitor session is enabled but its operational status is down, to enable the session, you must
first shut down the session and then resume the session.
Command Purpose
Step 1 config t Enters global configuration mode.
Example:
switch# config t
switch(config)#
Step 2 monitor session {session-range | all} shut Shuts down the specified SPAN sessions. The
session ranges from 1 to 18. By default, sessions are
Example:
switch(config)# monitor session 3 shut
created in the shut state. Only two sessions can be
running at a time.
Command Purpose
Step 3 no monitor session {session-range | all} Resumes (enables) the specified SPAN sessions. The
shut session ranges from 1 to 18. By default, sessions are
Example:
created in the shut state. Only two sessions can be
switch(config)# no monitor session 3 shut running at a time.
Note If a monitor session is enabled but its
operational status is down, then to enable the
session you must first specify the monitor
session shut command followed by the no
monitor session shut command.
Step 4 monitor session session-number Enters the monitor configuration mode. The new
session configuration is added to the existing session
Example:
switch(config)# monitor session 3
configuration.
switch(config-monitor)#
Step 5 shut Shuts down the SPAN session. By default, the
session is created in the shut state.
Example:
switch(config-monitor)# shut
Step 6 no shut Enables the SPAN session. By default, the session is
created in the shut state.
Example:
switch(config-monitor)# no shut Note Only two SPAN sessions can be running
simultaneously.
Step 7 show monitor (Optional) Displays the status of SPAN sessions.
Example:
switch(config-monitor)# show monitor
Step 8 copy running-config startup-config (Optional) Copies the running configuration to the
startup configuration.
Example:
switch(config-monitor)# copy
running-config startup-config
RELATED TOPICS
Command Purpose
show monitor session {all | session-number | Displays the SPAN session configuration.
range session-range} [brief]
For detailed information about the fields in the output from these commands, see the Cisco Nexus 7000
Series NX-OS System Management Command Reference.
Step 1 Configure destination ports in access or trunk mode, and enable SPAN monitoring.
switch# config t
switch(config)# interface ethernet 2/5
switch(config-if)# switchport
switch(config-if)# switchport mode trunk
switch(config-if)# switchport monitor
switch(config-if)# no shut
switch(config-if)# exit
switch(config)#
Step 1 Configure destination ports in access or trunk mode, and enable SPAN monitoring.
switch# config t
switch(config)# interface ethernet 3/1
switch(config-if)# switchport
switch(config-if)# switchport mode trunk
switch(config-if)# switchport trunk allowed vlan add 100-200
Step 2 Configure destination ports in access or trunk mode, and enable SPAN monitoring.
switch# config t
switch(config)# interface ethernet 3/3
switch(config-if)# switchport
switch(config-if)# switchport mode trunk
switch(config-if)# switchport trunk allowed vlan add 100-200
switch(config-if)# switchport monitor
switch(config-if)# no shut
switch(config-if)# exit
switch(config)#
Element Description
Session Id Local SPAN session number that can only be specified when the session is
first created. The value ranges from 1 to 18.
Description Description for this session.
Filtered VLANs When clicked, list of configured VLANs appears.
Admin Status Administrative status of the session.
Operational Status Display only. Whether the session is shut (down) or enabled (up).
Status Description Display only. Status description.
Element Description
Source
Interface/VLAN Display only. Port or VLAN number.
Description Display only. Port or VLAN description.
Ingress Status of whether to monitor ingress packets.
Egress Status of whether to monitor egress packets.
Destination
Interface Display only. Port number.
Description Display only. Port description.
Additional References
For additional information related to implementing SPAN, see the following sections:
• Related Documents, page 8-22
• Standards, page 8-22
Related Documents
Related Topic Document Title
VDCs Cisco Nexus 7000 Series NX-OS Virtual Device Context
Configuration Guide, Release 5.x
VDCs Virtual Device Context Configuration Guide, Cisco DCNM for LAN,
Release 6.x
SPAN commands: complete command syntax, Cisco Nexus 7000 Series NX-OS System Management Command
command modes, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
This chapter describes how to configure the Link Layer Discovery Protocol (LLDP) in order to discover
other devices on the local network.
This chapter describes how to configure the Link Layer Discovery Protocol (LLDP) in order to discover
servers that are connected to your Cisco NX-OS device.
You can configure the Link Layer Discovery Protocol (LLDP) in order to discover servers that are
connected to your Cisco NX-OS device.
Note System-message logging levels for the LLDP feature must meet or exceed Cisco DCNM requirements.
During device discovery, Cisco DCNM detects inadequate logging levels and raises them to the
minimum requirements. Cisco Nexus 7000 Series switches that run Cisco NX-OS Release 4.0 are an
exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the command-line interface to
configure logging levels to meet or exceed Cisco DCNM requirements. For more information, see the
Fundamentals Configuration Guide, Cisco DCNM for LAN, Release 5.x .
Note The Cisco NX-OS release that is running on a managed device may not support all of the features or
settings described in this chapter. For the latest feature information and caveats, see the documentation
and release notes for your platform and software release.
LLDP Overview
The Cisco Discovery Protocol (CDP) is a device discovery protocol that runs over the data-link layer
(Layer 2) on all Cisco-manufactured devices (routers, bridges, access servers, and switches). CDP allows
network management applications to automatically discover and learn about other Cisco devices that are
connected to the network.
To permit the discovery of non-Cisco devices, the switch also supports the Link Layer Discovery
Protocol (LLDP), a vendor-neutral device discovery protocol that is defined in the IEEE 802.1ab
standard. LLDP allows network devices to advertise information about themselves to other devices on
the network. This protocol runs over the data-link layer, which allows two systems running different
network layer protocols to learn about each other.
LLDP is a one-way protocol that transmits information about the capabilities and current status of a
device and its interfaces. LLDP devices use the protocol to solicit information only from other LLDP
devices. Cisco DCNM can use LLDP to discover only servers that are connected to your device.
LLDP supports a set of attributes that it uses to discover other devices. These attributes contain type,
length, and value (TLV) descriptions. LLDP devices can use TLVs to send and receive information to other
devices on the network. Details such as configuration information, device capabilities, and device
identity can be advertised using this protocol.
LLDP advertises the following TLVs by default:
• DCBXP
• Management address
• Port description
• Port VLAN
• System capabilities
• System description
• System name
Note For information on device discovery and manually binding devices to a server, see the Fundamentals
Configuration Guide, Cisco DCNM for LAN, Release 5.x .
High Availability
The LLDP feature supports stateless and stateful restarts. After a reboot or supervisor switchover, the
running configuration is applied.
For more information on high availability, see the Cisco Nexus 7000 Series NX-OS High Availability and
Redundancy Guide, Release 5.x.
Virtualization Support
One instance of LLDP is supported per virtual device context (VDC). You are automatically placed in
the default VDC unless you specify otherwise.
For information on VDCs, see the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration
Guide, Release 5.x.
For information on VDCs, see the Virtual Device Context Configuration Guide, Cisco DCNM for LAN,
Release 6.x.
Prerequisites
The LLDP feature has the following prerequisite (for a full list of feature-specific prerequisites, see the
platform-specific documentation):
• System-message logging levels for the LLDP feature must meet or exceed Cisco DCNM
requirements. During device discovery, Cisco DCNM detects inadequate logging levels and raises
them to the minimum requirements. Cisco Nexus 7000 Series switches that run Cisco NX-OS
Release 4.0 are an exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the
command-line interface to configure logging levels to meet or exceed Cisco DCNM requirements.
For more information, see the Fundamentals Configuration Guide, Cisco DCNM for LAN, Release
5.x .
• LLDP timers and type, length, and value (TLV) descriptions cannot be configured using Cisco DCNM.
Platform Support
The following platform supports this feature. For platform-specific information, including guidelines
and limitations, system defaults, and configuration limits, see the corresponding documentation.
Platform Documentation
Cisco Nexus 5000 Series switches Cisco Nexus 5000 Series Switch Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switch Documentation
Default Settings
Table 9-1 lists the LLDP default settings.
Parameter Default
Global LLDP Disabled
LLDP on interfaces Enabled, after LLDP is enabled globally
LLDP hold time (before discarding) 120 seconds
LLDP reinitialization delay 2 seconds
LLDP timer (packet update frequency) 30 seconds
LLDP TLVs Enabled
LLDP receive Enabled, after LLDP is enabled globally
LLDP transmit Enabled, after LLDP is enabled globally
Configuring LLDP
This section includes the following topics:
• Enabling or Disabling LLDP Globally, page 9-4
• Enabling or Disabling LLDP on an Interface, page 9-6
• Configuring Optional LLDP Parameters, page 9-8
Note Cisco NX-OS commands for this feature may differ from Cisco IOS commands for a similar feature.
Note LLDP is enabled globally on Cisco Nexus 5000 Series switches and cannot be disabled.
Make sure that you are in the correct VDC. To switch VDCs, use the switchto vdc command.
SUMMARY STEPS
1. config t
2. [no] feature lldp
3. show running-config lldp
4. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Interfaces > Physical > Ethernet. The available devices appear
in the Summary pane.
Step 2 From the Summary pane, click the device on which you want to enable or disable LLDP.
Step 3 Do one of the following:
• To enable LLDP on the device, from the menu bar, choose Actions > Enable LLDP Service.
• To disable LLDP on the device, from the menu bar, choose Actions > Disable LLDP Service.
Step 4 From the menu bar, choose File > Deploy to apply your changes to the device.
Command Purpose
Step 1 config t Enters global configuration mode.
Example:
switch# config t
Enter configuration commands, one per
line. End with CNTL/Z.
switch(config)#
Step 2 [no] feature lldp Enables or disables LLDP on the device. LLDP is
disabled by default.
Example:
switch(config)# feature lldp
Step 3 show running-config lldp (Optional) Displays the global LLDP configuration.
If LLDP is enabled, it shows “feature lldp.” If LLDP
Example:
switch(config)# show running-config lldp
is disabled, it shows an “Invalid command” error.
Step 4 copy running-config startup-config (Optional) Saves the change persistently through
reboots and restarts by copying the running
Example:
switch(config)# copy running-config
configuration to the startup configuration.
startup-config
switch# config t
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# feature lldp
RELATED TOPICS
Note Beginning with Cisco DCNM Release 5.1, you can enable or disable LLDP on individual interfaces on
Cisco Nexus 5000 Series switches.
Make sure that you are in the correct VDC. To switch VDCs, use the switchto vdc command.
Make sure that you have globally enabled LLDP on the device. For more information, see the “Enabling
or Disabling LLDP Globally” section on page 9-4.
SUMMARY STEPS
1. config t
2. interface ethernet slot/port
3. [no] lldp transmit
4. [no] lldp receive
5. show lldp interface ethernet slot/port
6. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Interfaces > Physical > Ethernet. The available devices appear
in the Summary pane.
Step 2 From the Summary pane, expand the device, expand the slot, and click the port on which you want to
enable or disable LLDP.
Tabs appear for the port information in the Details pane. The Port Details tab is active, but its sections
are not expanded.
Step 3 Do one of the following:
• To disable LLDP on the port, from the menu bar, choose Actions > Disable LLDP.
• To enable LLDP on the port, from the menu bar, choose Actions > Enable LLDP.
Step 4 From the Details pane, expand the Basic Settings section.
When LLDP is enabled, the LLDP Transmit Enabled and LLDP Receive Enabled fields show “Enabled.”
When LLDP is disabled, the LLDP Transmit Enabled and LLDP Receive Enabled fields show
“Disabled.”
Step 5 (Optional) To selectively configure the port to only send or only receive LLDP packets, do one of the
following:
• To configure the port to only send LLDP packets, choose Enabled from the LLDP Transmit Enabled
drop-down list and choose Disabled from the LLDP Receive Enabled drop-down list.
• To configure the port to only receive LLDP packets, choose Disabled from the LLDP Transmit
Enabled drop-down list and choose Enabled from the LLDP Receive Enabled drop-down list.
Step 6 From the menu bar, choose File > Deploy to apply your changes to the device.
Command Purpose
Step 1 config t Enters global configuration mode.
Example:
switch# config t
Enter configuration commands, one per
line. End with CNTL/Z.
switch(config)#
Step 2 interface ethernet slot/port Specifies the interface on which you are enabling
LLDP and enters the interface configuration mode.
Example:
switch(config)# interface ethernet 7/1
switch(config-if)
Step 3 [no] lldp transmit Enables or disables the transmission of LLDP
packets on an interface. After you globally enable
Example:
switch(config-if)# lldp transmit
LLDP, it is enabled on all supported interfaces by
default.
Step 4 [no] lldp receive Enables or disables the reception of LLDP packets
on an interface. After you globally enable LLDP, it
Example:
switch(config-if)# lldp receive
is enabled on all supported interfaces by default.
Step 5 show lldp interface ethernet slot/port (Optional) Displays the LLDP configuration on the
interface.
Example:
switch(config-if)# show lldp interface
ethernet 7/1
Step 6 copy running-config startup-config (Optional) Saves the change persistently through
reboots and restarts by copying the running
Example:
switch(config-if)# copy running-config
configuration to the startup configuration.
startup-config
This example shows how to disable the transmission of LLDP packets on an interface:
switch# config t
switch(config)# interface ethernet 7/1
switch(config-if)# no lldp transmit
RELATED TOPICS
Make sure that you are in the correct VDC. To switch VDCs, use the switchto vdc command.
SUMMARY STEPS
1. config t
2. [no] lldp holdtime seconds
3. [no] lldp reinit seconds
4. [no] lldp timer seconds
5. show lldp timers
6. [no] lldp tlv-select tlv
7. show lldp tlv-select
8. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters global configuration mode.
Example:
switch# config t
Enter configuration commands, one per
line. End with CNTL/Z.
switch(config)#
Step 2 [no] lldp holdtime seconds (Optional) Specifies the amount of time in seconds
that a receiving device should hold the information
Example:
switch(config)# lldp holdtime 200
sent by your device before discarding it.
The range is 10 to 255 seconds; the default is 120
seconds.
Step 3 [no] lldp reinit seconds (Optional) Specifies the delay time in seconds for
LLDP to initialize on any interface.
Example:
switch(config)# lldp reinit 5 The range is 1 to 10 seconds; the default is 2
seconds.
Command Purpose
Step 4 [no] lldp timer seconds (Optional) Specifies the transmission frequency of
LLDP updates in seconds.
Example:
switch(config)# lldp timer 50 The range is 5 to 254 seconds; the default is 30
seconds.
Step 5 show lldp timers (Optional) Displays the LLDP hold time, delay time,
and update frequency configuration.
Example:
switch(config)# show lldp timers
Step 6 [no] lldp tlv-select tlv (Optional) Specifies the TLVs to send and receive in
LLDP packets. The available TLVs are dcbxp,
Example:
switch(config)# lldp tlv-select
management-address, port-description, port-vlan,
system-name system-capabilities, system-description, and
system-name. All available TLVs are enabled by
default.
Note For more information about using these
TLVs, see the Cisco Nexus 7000 Series
NX-OS System Management Command
Reference.
Step 7 show lldp tlv-select (Optional) Displays the LLDP TLV configuration.
Example:
switch(config)# show lldp tlv-select
Step 8 copy running-config startup-config (Optional) Saves the change persistently through
reboots and restarts by copying the running
Example:
switch(config)# copy running-config
configuration to the startup configuration.
startup-config
This example shows how to configure a hold time of 200 seconds, a delay time of 5 seconds, and an
update frequency of 50 seconds as well as how to disable the port-vlan TLV:
switch# config t
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# lldp holdtime 200
switch(config)# lldp reinit 5
switch(config)# lldp timer 50
switch(config)# no lldp tlv-select port-vlan
Command Purpose
show running-config lldp Displays the global LLDP configuration.
show lldp interface ethernet slot/port Displays the LLDP interface configuration.
show lldp timers Displays the LLDP hold time, delay time, and
update frequency configuration.
show lldp tlv-select Displays the LLDP TLV configuration.
Command Purpose
show lldp dcbx interface ethernet slot/port Displays the local DCBX control status.
show lldp neighbors {detail | interface ethernet Displays the LLDP neighbor device status.
slot/port}
show lldp traffic Displays the LLDP counters, including the
number of LLDP packets sent and received by the
device, the number of discarded packets, and the
number of unrecognized TLVs.
show lldp traffic interface ethernet slot/port Displays the number of LLDP packets sent and
received on the interface.
Use the clear lldp counters command to clear the LLDP statistics.
Additional References
For additional information related to implementing LLDP, see the following sections:
• Related Documents, page 9-10
• Standards, page 9-11
Related Documents
Related Topic Document Title
LLDP commands: complete command syntax, Cisco Nexus 7000 Series NX-OS System Management Command
command modes, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
This chapter describes how to use the Device OS Management feature in Cisco Data Center Network
Manager (DCNM).
The Device OS Management feature allows you to control the operating system installed on Nexus 7000
Series devices that are managed by DCNM. You can create software installation jobs that affect one or
more managed devices. DCNM can transfer the software images of operating systems to managed
devices using one of several supported protocols. Installation jobs can also use software images already
present on managed devices.
This chapter includes the following sections:
• Information About Device OS Management, page 10-1
• Licensing Requirements for Device OS Management, page 10-3
• Prerequisites, page 10-4
• Guidelines and Limitations for Device OS Management, page 10-4
• Platform Support, page 10-4
• Using the Device OS Management Window, page 10-5
• Configuring Software Installation Jobs, page 10-7
• Configuring File Servers, page 10-15
• Field Descriptions for Device OS Management, page 10-18
• Additional References, page 10-21
• Feature History for Device OS Management, page 10-22
The Software Installation wizard includes an optional step for verifying the version compatibility of
software images with the managed devices. During this step, if a software image was specified by a URL
or file server, Cisco DCNM instructs managed devices to copy the software image from the URL or file
server to the bootflash file system on the device. If you skip the version compatibility step, Cisco DCNM
does not instruct devices to copy software images from URLs or file servers until the installation job
begins.
File Servers
The File Servers feature allows you to configure file servers, which you can use for the following
purposes:
• Software installation jobs—Cisco DCNM can get software image files from a file server and transfer
them to devices included in a software installation job.
• Configuration rollbacks—Cisco DCNM can back up device configurations to a file server when you
roll back a device configuration.
Cisco DCNM supports file servers that use the following protocols:
• FTP
• SFTP
• TFTP
If you use a file server in a software installation job, consider the following items:
• The managed devices included in the job must be able to connect to the file server directly.
• To ensure that software image files transfer as quickly as possible, use a file server that is on the
same LAN as the devices included in the software installation job. If the available file servers
transfer software image files too slowly, before you create the software installation job, manually
copy the files to the devices that you will include in the job and configure the job to use the manually
copied files rather than a file server.
VDC Support
Device software images apply to physical devices rather than virtual device contexts (VDCs). When you
change the software image on a managed device, all VDCs on the device use the new software image.
Prerequisites
The Device OS Management feature has the following prerequisites (for a full list of feature-specific
prerequisites, see the platform-specific documentation):
• The Device OS Management feature supports only devices that are managed by Cisco DCNM,
which means that Cisco DCNM must have successfully discovered the device.
• The Device OS Management feature supports only devices that you have added to the list of Cisco
DCNM-licensed devices.
• Devices included in a software installation job must be reachable by Cisco DCNM when a software
installation job occurs. Software installation jobs fail for unreachable devices.
Platform Support
The following platforms support this feature but may implement it differently. For platform-specific
information, including guidelines and limitations, system defaults, and configuration limits, see the
corresponding documentation.
Platform Documentation
Cisco Nexus 4000 Series switches Cisco Nexus 4000 Series Switch Documentation
Cisco Nexus 5000 Series switches Cisco Nexus 5000 Series Switch Documentation
Cisco Nexus 6000 Series switches Cisco Nexus 6000 Series Switch Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switch Documentation
DETAILED STEPS
Tip To expand or collapse the System or the Software Installation Jobs sections, double-click the
section title.
Step 3 (Optional) To open a scheduled software installation job, in the System section, click the link to the
installation job.
The Feature Selector pane changes to the Software Installation Jobs feature. For more information, see
the “Viewing Software Installation Job Details” section on page 10-7.
RELATED TOPICS
Ensure that the software images that you want to install are available by one of the options that the
Software Installation wizard supports. For more information, see the “Software Installation Jobs”
section on page 10-2. The supported options are the following:
• File server—If you want to use a file server, ensure that the software images are available on the
server. You must also configure the file server in DCNM. For more information, see the “Adding a
File Server” section on page 10-15.
• Device file system—If you want to use software images that are in the local file system of the
devices, you must ensure that the images exist on the devices prior to configuring the installation
job.
You can specify a software image for a device type category rather than for a single device; however,
the image that you specify must exist on each device in the category in the same location and with
the same filename. For example, if you specify bootflash:/images/n7000-s1-dk9.4.1.2.upg.bin, the
n7000-s1-dk9.4.1.2.upg.bin image file must exist in bootflash:/images on each device in the device
category.
• URL—If you want to use a URL to specify the image files, what DCNM verifies for you and what
you need to ensure vary depending upon the transfer protocol that you use, as follows:
– FTP—DCNM verifies the URL format, that the FTP server in the URL is reachable, and that
the specified image file exists on the FTP server. The FTP URL format is as follows:
ftp://username@servername/path/filename
– SFTP—DCNM verifies the URL format, that the SFTP server in the URL is reachable, and that
the image file specified exists on the SFTP server. The SFTP URL format is as follows:
sftp://username@servername/path/filename
– TFTP—You must ensure that the path and image filename are correct. DCNM verifies the URL
format and that the TFTP server in the URL is reachable. The TFTP URL format is as follows:
tftp://servername/path/filename
– SCP—You must ensure that the SCP server is reachable and that the path and image filename
are correct. DCNM verifies the URL format. The SCP URL format is as follows:
scp://username@servername/path/filename
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management >Device OS Management.
A table of managed devices appears in the Summary pane.
Step 2 Click a device that you want to include in a new software installation job.
Step 3 From the menu bar, choose Actions > Install Software.
The Software Installation wizard dialog box displays the Select Switches step. The device that you
selected is listed under Selected Switches.
Step 4 To use the wizard, see the “Using the Software Installation Wizard” section on page 10-9.
RELATED TOPICS
You must have configured a software installation job before you can view its details.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management > Software Installation Jobs.
The Summary pane displays a table of software installation jobs.
Step 2 Click the software installation job for which you want to view details.
The Details pane displays two sections of information. The General section displays the job ID, the job
owner, scheduling information, comments, and installation options.
The Device and Software Images section displays a table of devices included in the job, the software
images to be installed on each device, and the status of the installation for the device.
Tip To expand or collapse the General or the Device and Software Images sections, double-click the
section title.
RELATED TOPICS
Ensure that the software images that you want to install are available by one of the options that the
Software Installation wizard supports. For more information, see the “Software Installation Jobs”
section on page 10-2.The supported options are the following:
To ensure that software image files transfer as quickly as possible, use a file server that is on the same
LAN as the devices included in the software installation job. If the available file servers transfer software
image files too slowly, before you create the software installation job, manually copy the files to the
devices that you will include in the job and configure the job to use the manually copied files rather than
a file server.
• File server—If you want to use a file server, ensure that the software images are available on the
server. You must also configure the file server in DCNM. For more information, see the “Adding a
File Server” section on page 10-15.
• Device file system—If you want to use software images that are in the local file system of the
devices, you must ensure that the images exist on the devices prior to configuring the installation
job.
You can specify a software image for a device type category rather than for a single device; however,
the image that you specify must exist on each device in the category in the same location and with
the same filename. For example, if you specify bootflash:/images/n7000-s1-dk9.4.1.2.upg.bin, the
n7000-s1-dk9.4.1.2.upg.bin image file must exist in bootflash:/images on each device in the device
category.
• URL—If you want to use a URL to specify the image files, what DCNM verifies for you and what
you need to ensure vary depending upon the transfer protocol that you use, as follows:
– FTP—DCNM verifies the URL format, that the FTP server in the URL is reachable, and that
the specified image file exists on the FTP server. The FTP URL format is as follows:
ftp://username@servername/path/filename
– SFTP—DCNM verifies the URL format, that the SFTP server in the URL is reachable, and that
the image file specified exists on the SFTP server. The SFTP URL format is as follows:
sftp://username@servername/path/filename
– TFTP—You must ensure that the path and image filename are correct. DCNM verifies the URL
format and that the TFTP server in the URL is reachable. The TFTP URL format is as follows:
tftp://servername/path/filename
– SCP—You must ensure that the SCP server is reachable and that the path and image filename
are correct. DCNM verifies the URL format. The SCP URL format is as follows:
scp://username@servername/path/filename
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management > Software Installation Jobs.
The Summary pane displays a table of software installation jobs.
Step 2 Do one of the following:
• If you want to create a job, from the menu bar, choose Actions > New.
• If you want to edit a job, in the Summary pane, click the job, and then, from the menu bar, choose
Actions > Edit.
The Software Installation wizard dialog box displays the Select Switches step.
Step 3 To use the wizard, see the “Using the Software Installation Wizard” section on page 10-9.
RELATED TOPICS
Start the Software Installation wizard, from one of the following places:
• Device OS Management—See the “Installing Software on a Device” section on page 10-5.
• Software Installation Jobs—See the “Creating or Editing a Software Installation Job” section on
page 10-8.
DETAILED STEPS
Step 1 In the Software Installation wizard dialog box, follow these steps for each device that you want to
include in the installation job:
a. Under Available Switches, click the device.
b. Click Add.
Tip To remove a device from the job, under Selected Switches, click the device and then click
Remove.
Tip The Next button remains unavailable until you have specified a kickstart image and a system
image for each device included in the software installation job.
Tip If you abort software installation on all devices, click Close to close the dialog box.
RELATED TOPICS
The software installation job that you want to reschedule must have a status of Scheduled. You cannot
reschedule aborted or completed jobs.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management > Software Installation Jobs.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management > Software Installation Jobs.
The Summary pane displays a table of software installation jobs.
Step 2 In the Summary pane, click the job that you want to delete.
The Details pane displays information about the job.
Step 3 From the menu bar, choose Actions > Delete.
A Warning dialog box displays a confirmation message.
Step 4 Click Yes.
The job is removed from the summary pane. You do not need to save your changes.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management > Software Installation Jobs.
The Summary pane displays a table of software installation jobs.
Step 2 In the Summary pane, click the job for which you want to add or change comments.
The Details pane displays information about the job.
Step 3 (Optional) From the Details tab, expand the General section, if necessary.
Step 4 In the Comments field, enter your comments.
Step 5 From the menu bar, choose File > Deploy to save the change to the job schedule.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management > Software Installation Jobs.
The Summary pane displays a table of software installation jobs.
Step 2 In the Summary pane, click the job for which you want to add or change comments.
The Details pane displays information about the job.
Step 3 (Optional) From the Details tab, expand the General section, if necessary.
Step 4 If you want devices in the software installation job to have only the default device configuration after
the installation job completes, follow these steps:
a. Check the Installation Options check box.
b. If you want the job to delete the startup configuration on each device, click the Erase Startup
Configuration before Installation radio button.
Step 5 If you want devices in the software installation job to have the same running configuration after the
installation job completes, follow these steps:
a. Check the Installation Options check box.
b. If you want the job to copy the running configuration to the startup configuration on each device,
click the Save Running Configuration to Startup before Installation radio button.
Step 6 If you want the devices in the software installation job to use their current startup configuration as their
running configuration after the software installation job completes, uncheck the Installation Options
check box.
Step 7 From the menu bar, choose File > Deploy to save the change to the job schedule.
RELATED TOPICS
Note If you use the hostname, it must be registered with the DNS server that the Cisco DCNM
server is configured to use.
• Transfer protocol that the server provides. Cisco DCNM supports the following transfer protocols:
– FTP
– SFTP
– TFTP
• Username and password that Cisco DCNM should use to access the server.
• The base directory on the server. All files and directories that Cisco DCNM needs to access must be
available under this directory.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management > File Servers.
The Contents pane displays a table of file servers.
Step 2 From the menu bar, choose Actions > New File Server.
A new row appears in the Contents pane, with the cursor in the Server Name/IP Address field.
Step 3 In the Server Name/IP Address field, enter the IP address or hostname of the file server.
Step 4 Double-click the Protocol field and choose the protocol from the list that appears. Supported protocols
are as follows:
• FTP
• SFTP
• TFTP
Step 5 If the file server requires authentication, double-click the User Credentials field and enter the username
and password for the server. If you want Cisco DCNM to remember the password, check the Save
Password check box.
Step 6 Double-click the Base Directory field.
The Software Image Browser dialog box appears.
Step 7 Explore the server file system and choose the directory that Cisco DCNM should use as the base
directory. All files and directories that Cisco DCNM needs to access must be located under this directory.
By default, the root directory of the server is the base directory.
Step 8 (Optional) Double-click the Comment field and enter your comments.
Step 9 From the menu bar, choose File > Deploy to save the change to the job schedule.
RELATED TOPICS
Note You cannot change the values in the Server Name/IP Address or Protocol fields. If you need to change
these values, delete the file server and create a file server with the new values.
If you are changing the user credentials or base directory, determine what the new user credentials or
base directory should be.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management > File Servers.
The Contents pane displays a table of file servers.
Step 2 In the table, locate the row for the file server that you want to change.
Step 3 Perform the following items to change the file server entry as needed:
• If you want to change the user credentials, double-click the User Credentials field for the file server
and enter or clear the username and password for the server. If you want Cisco DCNM to remember
the password, check the Save Password check box.
• If you want to change the base directory, double-click the Base Directory field and use the Software
Image Browser dialog box to choose the directory that Cisco DCNM should use as the base
directory.
• If you want to change the comments, double-click the Comments field and enter your comments.
Step 4 From the menu bar, choose File > Deploy to save the file server changes.
RELATED TOPICS
Ensure that the file server is specified in the Archival Settings feature as the file server for configuration
rollback. For more information, see the “Configuring the Rollback File Server Setting” section on
page 11-45.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Device OS Management > File Servers.
The Contents pane displays a table of file servers.
Step 2 In the table, click the row for the file server that you want to delete.
Step 3 From the menu bar, choose Actions > Delete.
Note If the file server is specified in the Archival Settings feature as the file server for a configuration
rollback, a dialog box informs you that the file server cannot be deleted. For more information,
see the “Configuring the Rollback File Server Setting” section on page 11-45.
The file server is removed from the summary pane. You do not need to save your changes.
RELATED TOPICS
Field Description
System
Device Name Display only. Name of the managed device.
IP Address Display only. IP address that Cisco DCNM uses to connect to the managed
device.
Field Description
Model Display only. Hardware model name of the managed device.
Redundancy Supervisor Display only. Whether the device has a secondary supervisor module.
Software
System Version Display only. Release number of the system image currently installed on the
managed device.
System Image Display only. Filename of the system image currently installed on the
managed device.
Kickstart Image Display only. Filename of the kickstart image currently installed on the
managed device.
Field Description
Job ID Display only. Identification number of the job.
Owner Display only. Cisco DCNM user who created the installation job.
Software Image and Display only. Name of the system image specified in the job.
Version
Scheduled At Display only. Date and time that the installation job is scheduled to occur.
Completed At Display only. Date and time that the installation job occurred. If the job has
not completed, this field is blank.
Status Display only. Status of the installation job. If the job is ongoing, failed, or
successful, you can expand the status and see more information about the
job.
Comment Display only. Text of any comments added to the installation job.
Field Description
General
Job ID Display only. Identification number of the job.
Field Description
Owner Display only. Cisco DCNM user who created the installation job.
Scheduled At Date and time that the installation job is scheduled to occur. If the job has
not yet occurred, this field is configurable.
Completed At Display only. Date and time that the installation job occurred. If the job has
not completed, this field is blank.
Status Display only. Status of the installation job.
Comment Text entered by Cisco DCNM users.
Installation Options
Installation Options Whether the installation job affects the startup configuration. By default, this
check box is unchecked.
Save Running Specifies that the installation job copies the running configuration of each
Configuration to Startup device in the job to its startup configuration prior to installing the software
before Installation image.
Erase Startup Specifies that the installation job erases the startup configuration of each
Configuration before device in the job prior to installing the software image.
Installation
Field Description
Device Display only. Name of the managed device.
Platform Display only. Hardware model name of the managed device.
Kickstart Image Display only. Filename of the kickstart image currently installed on the
managed device.
System Image Display only. Filename of the system image currently installed on the
managed device.
Field Description
Server Name/IP DNS name or IP address of the file server. If you use the file server in a
Address software installation job, ensure that devices in the job can connect to the
name or address that you specify. This field is editable only when you create
the file server entry. You cannot edit it after saving your changes to the Cisco
DCNM server.
Field Description
Protocol Transfer protocol supported by the server. Valid values are as follows:
• FTP
• SFTP
• TFTP
This field is editable only when you create the file server entry. You cannot
edit it after saving your changes to the Cisco DCNM server.
User Credentials Username and password required to access the file server.
Base Directory Directory that Cisco DCNM should consider as the root directory on the
server. Directories specified for software installation jobs using this server
will be relative to this directory.
Comment Text entered by Cisco DCNM users.
Additional References
For additional information related to the Device OS Management feature, see the following sections:
• Related Documents, page 10-22
• Standards, page 10-22
Related Documents
Related Topic Document Title
Upgrading and downgrading Cisco NX-OS software Cisco Nexus 7000 Series NX-OS Software Upgrade and Downgrade
using the command-line interface on Cisco Nexus 7000 Guide, Release 5.x
Series switches
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
This chapter describes how to use the Configuration Change Management feature on Cisco NX-OS
devices.
The Configuration Change Management feature allows you to keep an archive of configurations from
managed devices. You can view and compare configurations. You can roll back the configuration on a
managed device to any archived configuration that Cisco DCNM has for the device.
This chapter includes the following sections:
• Information About Configuration Change Management, page 11-23
• Licensing Requirements for Configuration Change Management, page 11-27
• Prerequisites, page 11-27
• Guidelines and Limitations for Configuration Change Management, page 11-28
• Platform Support, page 11-28
• Working with the Version Browser, page 11-28
• Configuring Archival Jobs, page 11-40
• Configuring Archival Settings, page 11-44
• Configuring Switch Profiles, page 11-45
• Field Descriptions for Configuration Change Management, page 11-49
• Additional References, page 11-53
• Feature History for Configuration Change Management, page 11-54
Note Beginning with Cisco Release 5.2(1), Cisco DCNM supports the Cisco IOS platform.
Note Beginning with Cisco DCNM Release 5.2(1), this feature supports Cisco Catalyst 6500 Series, Cisco
Nexus 1000 Series, Cisco Nexus 1010 Series, Cisco Nexus 3000 Series, Cisco Nexus 4000 Series, Cisco
Nexus 5000 Series, and Cisco Nexus 7000 Series devices.
Version Browser
The Version Browser feature allows you to see information about archived configurations, view and
compare specific configuration versions, and merge changes from one configuration version to another
version. After you modify a configuration by merging changes, you can save the modified configuration
as a text file on a file system that is available to the computer that you are using to run the Cisco DCNM
client.
From the Version Browser, you can initiate a configuration rollback for a managed Cisco Nexus 7000
Series device, using any of the archived configurations available in Cisco DCNM for the device. Cisco
DCNM uses the rollback feature available in Cisco IOS and Cisco NX-OS. For more information about
the Cisco NX-OS rollback feature, see the Cisco Nexus 7000 Series NX-OS System Management
Configuration Guide, Release 5.x.
Archival Jobs
The Archival Jobs feature allows you to control the automated archival of the running configuration on
managed devices. You can add, edit, and delete custom archival jobs. A job consists of settings that
determine when the job runs and a list of managed devices included in the job. You can choose to archive
configurations at a regular interval, at a scheduled time on selected days, or whenever Cisco DCNM
detects configuration changes on a device. You can also comment on a job.
The Default archival job always exists. You cannot delete it. By default, it is disabled.
Devices can be assigned to one archival job only. If you assign a device to an archival job, Cisco DCNM
removes the device from the job that it was previously assigned to.
If a managed device is not assigned to a custom archival job, Cisco DCNM automatically assigns it to
the Default archival job.
Archival Settings
The Archival Settings feature allows you to configure settings related to configuration change
management, including the number of configuration versions that Cisco DCNM stores for each managed
device, how many rollback and archival history entries Cisco DCNM stores for each managed device,
and which file server Cisco DCNM uses during a configuration rollback.
Switch Profiles
Note The Switch Profiles feature is supported only on the Cisco Nexus 5000 series switches.
Several applications require consistent configuration across Cisco Nexus 5000 Series switches in the
network. For example, with a virtual port channel (vPC), you must have identical configurations.
Mismatched configurations can cause errors or misconfigurations that can result in service disruptions.
The configuration synchronization (config-sync) feature in Cisco NX-OS Release 5.0(2)N1(1) allows
you to configure one switch profile and have the configuration be automatically synchronized to the peer
switch.
A switch profile provides the following benefits:
• Allows configurations to be synchronized between switches.
• Merges configurations when connectivity is established between two switches.
• Provides control of exactly which configuration gets synchronized.
• Ensures configuration consistency across peers through merge and mutual-exclusion checks.
• Provides verify and commit semantics.
• Supports configuring and synchronizing port profile configurations.
• Provides an import command to migrate existing vPC configurations to a switch profile.
Because different topologies require different commands that are included in a switch profile, the import
command mode allows you to modify the imported set of commands to suit a specific topology. For
example, a dual homed Fabric Extender (FEX) topology requires that most of the configuration is
synchronized. In other vPC topologies, the configuration that needs to be synchronized might be a much
smaller set of commands.
You need to enter the commit command to complete the import process and move the configuration into
the switch profile. Because configuration changes are not supported during the import process, if you
added new commands before entering the commit command, the switch profile remains unsaved and the
switch remains in the switch profile import mode. You can remove the added commands or abort the
import. Unsaved configurations are lost if the process is aborted. You can add new commands to the
switch profile after the import is complete.
Configuration Validation
Two types of configuration validation checks can identify two types of switch profile failures:
• Mutual exclusion checks
• Merge checks
Merge Checks
Merge checks are done on the peer switch that is receiving a configuration. The merge checks ensure
that the received configuration does not conflict with the switch profile configuration that already exists
on the receiving switch. The merge check occurs during the merge or commit process. Errors are
reported as merge failures and must be manually corrected.
When one or both switches are reloaded and the configurations are synchronized for the first time, the
merge check verifies that the switch profile configurations are identical on both switches. Differences in
the switch profiles are reported as merge errors and must be manually corrected.
VDC Support
Cisco DCNM treats each virtual device context (VDC) on a Cisco IOS and Cisco NX-OS device as a
separate device; therefore, Cisco DCNM archives the running configurations of each VDC if that Cisco
DCNM has successfully discovered the VDC and views it as a managed device.
Prerequisites
The Configuration Change Management feature has the following prerequisites (for a full list of
feature-specific prerequisites, see the platform-specific documentation):
• The Configuration Change Management feature supports only devices that are managed by Cisco
DCNM, which means that Cisco DCNM must have successfully discovered the device.
• The Configuration Change Management feature supports only devices that you have added to the
list of Cisco DCNM-licensed devices.
• Devices must be reachable by Cisco DCNM when Cisco DCNM attempts to archive the
configuration or to perform a configuration rollback. An archival job or configuration rollback fails
if the device is unreachable by Cisco DCNM.
Platform Support
The following platforms support this feature but may implement it differently. For platform-specific
information, including guidelines and limitations, system defaults, and configuration limits, see the
corresponding documentation.
Platform Documentation
Cisco Catalyst 6500 Series switches Cisco Catalyst 6500 Series Switches Documentation
Cisco Nexus 1000V Series switches Cisco Nexus 1000V Series Switch Documentation
Cisco Nexus 3000 Series switches Cisco Nexus 3000 Series Switch Documentation
Cisco Nexus 4000 Series switches Cisco Nexus 4000 Series Switch Documentation
Cisco Nexus 5000 Series switches Cisco Nexus 5000 Series Switch Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switch Documentation
A managed device must be on the list of Cisco DCNM-licensed devices before you can use it with
Configuration Change Management. Only licensed devices appear in the Version Browser.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
The Summary pane displays a table of devices.
Step 2 Click the device that has the archival status that you want to view.
The Details pane displays archive-related information about the device, including an Archival Status
section.
If the archival job that includes the device is enabled, the View Schedule link appears.
If the archival job that includes the device is disabled, the Enable Archival Schedule link appears.
Step 3 (Optional) If you want to view the details of the archival job that includes the device, click the View
Schedule link or the Enable Archival Schedule link. For more information, see the “Viewing Details
of an Archival Job” section on page 11-43.
RELATED TOPICS
A managed device must be on the list of Cisco DCNM-licensed devices before you can use it with
Configuration Change Management. Only licensed devices appear in the Version Browser.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
The Summary pane displays a table of devices.
Step 2 Click the device that has archival history that you want to view.
The Details pane displays archive-related information about the device, including an Archival History
section.
Step 3 (Optional) If necessary, click the Archival History section to expand it.
The Archival History section displays a table that lists every attempt made to create a new archival
configuration version for the device.
RELATED TOPICS
A managed device must be on the list of Cisco DCNM-licensed devices before you can use it with
Configuration Change Management. Only licensed devices appear in the Version Browser.
The archived configuration versions that you want to browse or comment on must exist in Cisco DCNM.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
The Summary pane displays a table of devices.
Step 2 Double-click the device that has archived configuration versions that you want to browse.
A list of archived configuration versions appears below the device that you double-clicked. For each
version, the Summary pane shows the version ID, the date and time that Cisco DCNM created the
version, the Cisco DCNM user who created the version, and comments about the version.
Step 3 (Optional) If you want to comment on a version, follow these steps:
a. Click the version that you want to update with comments.
The Details pane shows the Version Details tab, which contains the same information about the
version that appears in the Summary pane, except that the Comments field is available for you to use.
b. Click in the Comments field and enter your comments.
c. From the menu bar, choose File > Deploy to save your changes to the Cisco DCNM server.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
The available devices appear in the Summary pane.
Step 2 Right-click the appropriate device and from the drop-down list, choose Copy Run to Start. You can also
press the F7 key to start the Copy Run to Start feature.
A flag appears at the end of the row to indicate that the copy process is in progress. The flag remains
when the process is finished to indicate that a configuration change has been made to the device.
The running configuration is copied to the startup configuration.
Archiving the current running configuration succeeds only if the most recent archived version in Cisco
DCNM is different from the current running configuration.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
The Summary pane displays a table of devices.
Step 2 Click the device that has a running configuration that you want to archive now.
Step 3 From the menu bar, choose Actions > Archive Configuration.
Step 4 To confirm that Cisco DCNM successfully archived the configuration, view the list of archived
configuration versions for the device. If necessary, double-click the device to open the list. The new
version should appear at the top of the list.
Note If a dialog box notifies you that archiving the configuration was skipped, that means that Cisco
DCNM did not detect differences between the current running configuration and the most recent
archived configuration version for the device. To close the dialog box, click OK.
RELATED TOPICS
A managed device must be on the list of Cisco DCNM-licensed devices before you can use it with
Configuration Change Management. Only licensed devices appear in the Version Browser.
The archived configuration version that you want to view must exist in Cisco DCNM.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
Tip You can search the text of the configuration by pressing Ctrl + F.
RELATED TOPICS
A managed device must be on the list of Cisco DCNM-licensed devices before you can use it with
Configuration Change Management. Only licensed devices appear in the Version Browser.
If you are comparing archived configuration versions, the two versions must exist in Cisco DCNM.
If you are comparing an archived configuration version to a running configuration or startup
configuration on a managed device, the device must be reachable by Cisco DCNM.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
The Summary pane displays a table of devices.
Step 2 Double-click the device that has an archived configuration version that you want to compare to another
configuration version.
Step 3 (Optional) If necessary, to view the list of archived configurations for the device, double-click the
device.
Step 4 Click the archived configuration version that you want to compare to another configuration version.
Step 5 Use to compare the selected version to the configuration version that you want.
In the Details pane, the Compare tab displays the two configuration versions in side-by-side panes.
Step 6 Use the version comparison tools as needed. For more information, see the “Using the Version
Comparison Tools” section on page 11-35.
RELATED TOPICS
Note You must be comparing two configurations to use the version comparison tools. For more information,
see the “Comparing Configuration Versions” section on page 11-33.
RELATED TOPICS
DETAILED STEPS
Step 1 Use the icon and the icon as needed to jump to the line that you want to merge from the left
configuration pane into the right configuration pane.
Tip The icon becomes available only when you use the icon and the icon to locate
differences.
Step 4 (Optional) If you would like to save a copy of the configuration in the left pane as an ASCII text file,
click the icon and use the Save dialog box to save the configuration to a filename and location that
you specify.
RELATED TOPICS
A managed Cisco Nexus 7000 Series device must be on the list of Cisco DCNM-licensed devices before
you can use it with Configuration Change Management. Only licensed devices appear in the Version
Browser.
The archived configuration version that you want to use in the rollback must exist in Cisco DCNM.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
The Summary pane displays a table of devices.
Step 2 Click the Cisco Nexus 7000 Series device for which you want to perform a configuration rollback.
The Details pane displays archival information about the device, including a Rollback History section.
Step 3 (Optional) If necessary, to view the list of archived configurations for the device, double-click the
device.
Step 4 Click the version of the archived configuration that you want to use as the running configuration on the
device.
Step 5 Do one of the following:
• If you want to save the configuration version that you selected as the startup configuration on the
device, choose one of the following rollback options:
– If you want Cisco DCNM to restore the original running configuration of the device if any
configuration command fails during the rollback, from the menu bar, choose Actions >
Rollback and Save as Start-up > Restore Original Config on Error (Atomic).
– If you want Cisco DCNM to ignore configuration errors during a rollback, from the menu bar,
choose Actions > Rollback and Save as Start-up > Skip Errors and Rollback (Best Effort).
– If you want Cisco DCNM to stop the rollback at the first configuration error, from the menu bar,
choose Actions > Rollback and Save as Start-up > Stop Rollback at First Error.
• If you want the rollback to proceed without affecting the startup configuration currently on the
device, choose one of the following rollback options:
– If you want Cisco DCNM to restore the original running configuration of the device if any
configuration command fails during the rollback, from the menu bar, choose Actions >
Rollback > Restore Original Config on Error (Atomic).
– If you want Cisco DCNM to ignore configuration errors during a rollback, from the menu bar,
choose Actions > Rollback > Skip Errors and Rollback (Best Effort).
– If you want Cisco DCNM to stop the rollback at the first configuration error, from the menu bar,
choose Actions > Rollback > Stop Rollback at First Error.
Cisco DCNM begins the rollback operation.
RELATED TOPICS
A managed Cisco Nexus 7000 Series device must be on the list of Cisco DCNM-licensed devices before
you can use it with Configuration Change Management. Only licensed devices appear in the Version
Browser.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
The Summary pane displays a table of devices.
Step 2 Click the device for which you want to view the rollback history.
The Details pane displays archival information about the device, including a Rollback History section.
Step 3 (Optional) If necessary, double-click the Rollback History section to expand it.
In the Rollback History section, a table of rollback history events appears. If no configuration rollbacks
have occurred on the device, the table is empty.
RELATED TOPICS
Be certain that you do not want any of the archived configuration versions for the device. You cannot
undo the deletion and the Cisco DCNM client does not confirm your choice to delete the archived
configuration versions.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Version Browser.
The Summary pane displays a table of devices.
Step 2 Click the device that has archived configurations that you want to delete.
Step 3 Verify that you clicked the correct device.
Note The next step deletes the archived configuration versions without confirming your choice.
Step 4 From the menu bar, choose Actions > Delete All Versions.
The archived configurations for the selected device disappear from the Summary pane.
RELATED TOPICS
A managed device must be on the list of Cisco DCNM-licensed devices before you can use it with
Configuration Change Management. You can include only licensed devices in an archival job.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Archival Jobs.
The Summary pane displays a table of archival jobs.
Step 2 Do one of the following:
• If you want to create an archival job, from the menu bar, choose File > New Job.
• If you want to make changes to an existing archival job, in the Summary pane, click the job that you
want to change.
The Details pane shows the Details tab and Archival History tab for the job.
Step 3 (Optional) If necessary, in the Details pane, click the Details tab.
Step 4 (Optional) In the Comments field, enter your comments about the job.
Step 5 (Optional) If you want the job to archive configurations at a specific time, follow these steps:
a. Click the Archive at Specified Time radio button.
b. In the row of Days check boxes, check the check box for each day that you want the archival job to
be active.
c. Do one of the following:
– If you want the job to archive configurations at a regular interval, click the Archive Interval
radio button and use the adjacent box and list to specify the interval. You can specify an interval
in minutes or hours. The maximum interval is either 59 minutes or 23 hours.
– If you want the job to archive configurations once on each day that the job is active, click the
Archive at radio button and use the adjacent box to specify the time that you want the job to
start.
Step 6 (Optional) If you want the job to archive configurations at any time that Cisco DCNM detects a change
to the configuration of a device included in the job, click the Archive whenever a Configuration
Change is Detected radio button.
Step 7 (Optional) If you want to add one or more devices to the archival job, follow these steps:
a. Under Device, right-click in a blank area and choose Add New Device.
A dialog box shows available and selected devices.
a. For each device that you want to add, under Available Devices, click the device and click Add.
b. Click OK.
The devices that you added appear under Devices.
Step 8 (Optional) If you want to remove a device from an archival job, follow these steps:
a. Under Devices, click the device that you want to remove from the job.
b. Right-click the device and choose Remove Device.
The device that you removed no longer appears under Devices.
Step 9 From the menu bar, choose File > Deploy to save your changes to the Cisco DCNM server.
If you created an archival job, it is enabled by default. If you changed an existing archival job, whether
it is enabled or disabled, the archival job information does not change.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Archival Jobs.
The Summary pane displays a table of archival jobs. In the Job ID column, enabled jobs show a green
triangle and disabled jobs show a red square.
Step 2 In the Summary pane, click the archival job that you want to enable or disable.
Step 3 Do one of the following:
• To enable the job, from the menu bar, choose Actions > Enable. The icon in the Job ID column
changes to show a green triangle.
• To disable the job, from the menu bar, choose Actions > Disable. The icon in the Job ID column
changes to show a red square.
You do not need to save your changes.
RELATED TOPICS
At least one custom archival job must exist in Cisco DCNM. You cannot delete the Default archival job.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Archival Jobs.
The Summary pane displays a table of archival jobs.
Step 2 In the Summary pane, click the archival job that you want to delete.
Step 3 From the menu bar, choose Actions > Delete.
The archival job disappears from the Summary pane.
Devices that were included in the deleted job are automatically added to the Default archival job.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Archival Jobs.
The Summary pane displays a table of archival jobs.
Step 2 In the Summary pane, click the archival job that has details that you want to view.
The Details pane displays information about the archival job, including a Details tab.
Step 3 (Optional) If necessary, in the Details pane, click the Details tab.
The Details pane displays information and settings for the archival job that you selected.
RELATED TOPICS
The archival job must have occurred at least once; otherwise, there are no archival history entries to view.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Archival Jobs.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Archival Settings.
The Contents pane displays the Archival Settings fields.
Step 2 (Optional) Enter a value from 0 to 50 in the Maximum Version for a Device [0 - 50] field to configure
the maximum number of configuration versions that Cisco DCNM should archive for each managed
device.
Step 3 (Optional) Enter a value from 0 to 100 in the Max Rollback and Archival History Status [0 - 100] field
to configure the maximum number of rollback history and archival history status entries that Cisco
DCNM retains for each managed device.
Step 4 From the menu bar, choose File > Deploy to save your changes to the Cisco DCNM server.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Archival Settings.
The Contents pane displays the Archival Settings fields.
Step 2 (Optional) If you want Cisco DCNM to use any available file server during a configuration rollback,
under File Server for Configuration Rollback, click the Any File Server radio button.
Step 3 (Optional) If you want to specify a file server that Cisco DCNM should use during a configuration
rollback, follow these steps:
a. Under File Server for Configuration Rollback, click the Use the following File Server radio button.
b. From the File Server drop-down list, choose the file server.
Step 4 From the menu bar, choose File > Deploy to save your changes to the Cisco DCNM server.
Note This feature is supported only on Cisco Nexus 5000 Series switches.
You must create the switch profile with the same name on each switch and the switches must configure
each other as a peer. When connectivity is established between switches with the same active switch
profile, the switch profiles are synchronized.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Switch-Profile.
All Cisco Nexus 5000 Series switches that are managed by Cisco DCNM are displayed in the Summary
pane.
Step 2 Expand the Cisco Nexus 5000 switches to view the switch-profile information.
Step 3 Choose a specific switch-profile for the Cisco Nexus 5000 Series switch. The profile details is displayed
in the detailed pane.
You can choose one of the following four options:
• Sync Status—Displays the last session operation status on the switch profile.
• Effective Configuration—Displays the most effective switch-profile configurations on the switch.
• Buffered Configuration—Displays the non committed switch-profile configurations on the switch.
• Events—Displays any events that are specific to the switch-profile.
Note This feature is supported only on the Cisco Nexus 5000 Series switches.
Switch profiles address the configuration conflicts between vPC peers in the network. By using Cisco
DCNM, you can configure switch profiles between the vPC peers by selecting any one of the switches.
Cisco DCNM configures the switch profiles on both the selected switch and its vPC peer switch with
sync-peer IP addresses.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Switch-Profile.
All Cisco Nexus 5000 Series switches that are managed by Cisco DCNM are displayed in the Summary
pane.
Step 2 In the Summary pane, choose one of the vPC peer switches by right-clicking the vPC peer that you want.
Step 3 From the Context menu, click the New switch-profile with vPC peer tab.
Cisco DCNM checks if there is any vPC configuration available in the selected switch and if the vPC is
active.
A dialog box is appears if the vPC is active.
Step 4 Click Yes to create the switch profile.
Step 5 (Optional) Edit the switch-profile name, and click Ok to proceed with the configuration.
Note If there is no active vPC in the selected switch, Cisco DCNM displays an error message and does not
create the switch profile.
Note This feature is supported only on the Cisco Nexus 5000 Series switches.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Switch-Profile.
All Cisco Nexus 5000 Series switches that are managed by Cisco DCNM are displayed in the Summary
pane.
Step 2 From the Summary pane, choose one of the switches.
Step 3 From the Context menu, choose the New switch-profile with any other switch tab.
Cisco DCNM launches the switch profile configuration wizard.
Note By default, the wizard displays the switch profile name and the source switch IP address. You can edit
the preferred name and also choose the destination switch IP from the drop-down list.
Step 4 From the drop-down list, choose the destination switch IP address.
Step 5 Click Next.
The wizard configuration summary details appear.
Step 6 Click Finish to create the switch-profile configuration.
Note This feature is supported only on the Cisco Nexus 5000 Series switches.
The switch-profile network view captures all the Cisco Nexus 5000 Series vPC peers in the network. If
a switch profile already exists in the peers, the corresponding switch profile sync status information
displays in the configuration sync network view.
If no switch profile exists between the vPC peers, Cisco DCNM provides an option that allows you to
configure the switch profile between the peers. If there are any dual-homed Fabric Extenders (FEXs)
between the vPC peers, you can import the FEX host interfaces (HIF) configurations inside the switch
profile.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Switch-Profile.
All Cisco Nexus 5000 Series switches that are managed by Cisco DCNM are displayed in the Summary
pane.
Step 2 From the Summary pane, choose a switch by right-clicking the switch that you want. You can choose
one of the following options:
• Migration—This option is displayed only if there is no switch profile between the vPC Peers.
Choose this option to launch the migration wizard using Cisco DCNM.
• Manage Switch profile—Choose this option to go to the switch profile screen and choose the
switch profile on the primary switch.
Configuring the Switch Profile Migration Wizard for Dual Homed FEXs
Note This feature is supported only on the Cisco Nexus 5000 Series switches.
You can launch the migration wizard using any one of the following options:
• Migration Context menu
• Migration link provided in the switch-profile Name column.
Both options are active only when no switch profile is configured on both vPC peers.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Configuration Change Management > Switch-Profile.
All the vPCs in the Cisco Nexus 5000 Series switch peers that are managed by Cisco DCNM are
displayed in the Summary pane.
Step 2 From the Summary pane, choose a row.
Step 3 Right-click the selected row.
Step 4 Choose the Migration option.
The Migration wizard appears with the vPC peers switches as primary and secondary with the default
switch-profile name.
Step 5 A dual selector option with the FEXs that are present in the primary vPC switch is displayed in the
Migration wizard.
Note If the FEXs are online, they are automatically selected for the host interfaces (HIF) import. Any
pre-provisioned FEXs will not be automatically selected.
RELATED TOPICS
Field Description
Status Display only. Whether the archival job that the device is assigned to is
enabled or disabled.
Field Description
Schedule Display only. When the archival job that the device is assigned to is
scheduled to occur.
Job ID Display only. Identification number of the archival job that the device is
assigned to.
Field Description
Time Display only. Date and time that the rollback occurred.
Version Display only. Configuration version that became the running configuration
as a result of the rollback.
User Display only. Username of the Cisco DCNM user who initiated the rollback.
Status Display only. Whether the rollback succeeded or failed.
Field Description
Time Stamp Display only. Date and time that the archival event occurred.
Job Id Display only. Identification number of the archival job that created the
archival event.
Status Display only. Whether the archival event succeeded, failed, or was skipped.
Reason Display only. Cause of a skipped or failed archival event.
Field Description
Config Version ID Display only. Version identification number for the archived configuration
version. Each archived configuration for a device receives a unique version
ID.
Creation Time Display only. Date and time that an archival job created the configuration
version.
Created By Display only. Username of the Cisco DCNM user who created the archival
job that created the configuration version or the Cisco DCNM user who
manually initiated the archival event that created the configuration version.
Comments Text entered by a Cisco DCNM user.
Field Description
Device Name of the managed device that the configuration version came from. In the
left configuration pane, this field is display only. In the right configuration
pane on the Compare tab, this field is configurable and you can select any
managed device that you have added to the Cisco DCNM license.
Version Configuration version ID of the archived configuration. In the left
configuration pane, this field is display only. In the right configuration pane
on the Compare tab, this field is a drop-down list with the following options:
• Configuration version IDs—The numbers of the archived configuration
versions currently available in Cisco DCNM.
• Running-Configuration—The running configuration currently on the
managed device selected in the Device field.
• Start-up Config—The startup configuration currently on the managed
device selected in the Device field.
Field Description
General
Job ID Display only. Identification number of the archival job.
Owner Display only. Username of the Cisco DCNM user who created the archival
job.
Comments Text entered by Cisco DCNM users.
Settings
Enable Archival Whether the archival job is enabled. By default, this check box is unchecked.
Archive at Specified Archival job that occurs at the time specified by the Days and Archival
Time Interval or Archive at fields.
Days Days of the week that the archival job occurs. By default, the All check box
is checked, which makes the individual day check boxes unavailable.
Archive Interval Archival job that occurs at a regular interval, specified by the interval value
box and the unit drop-down list, to the right of this radio button.
Field Description
Archive at Archival job that occurs once on each active day at the time specified in the
box to the right of this radio button.
Archive whenever a Archival job that occurs when Cisco DCNM detects that the running
Configuration Change configuration of a device has changed.
is Detected
Devices
Name Name of devices that are assigned to the archival job.
IP Address IP address that Cisco DCNM uses to connect to the device.
Field Description
Time Display only. Date and time that the archival job ran.
Status Display only. Number of devices in the job for which the archival job run
succeeded, failed, or was skipped. The numbers are shown after each status,
in parentheses.
Device Name Display only. Name of a device assigned to the job. This field is shown when
you expand the status of an archival history entry.
IP Address Display only. IP address that Cisco DCNM used to attempt to connect to the
device. This field is shown when you expand the status of an archival history
entry.
Status (per Device) Display only. Whether the archival job run succeeded, failed, or was skipped
for the device.
Reason Display only. Explanation for the status. For example, if the device was
skipped because the running configuration had not changed since the
previous archival job run, the following text appears in the Reason field:
Archival skipped as there are no changes from the previous version
Field Description
Maximum Versions for Largest number of archived configuration versions that Cisco DCNM retains
a Device for each device included in an archival job. Valid values are from 0 to 50,
where 50 is the default value.
Max Rollback and Largest number of rollback history and archival history status entries Cisco
Archival History Status DCNM retains for each device.
File Server for Configuration Rollback
Field Description
Any File Server File server that Cisco DCNM selects to upload configurations to during a
configuration rollback. Any file server that you have configured in Cisco
DCNM may be used.
Use the following File File server that Cisco DCNM uploads configurations to during a
Server configuration rollback to the File Server drop-down list.
File Server IP address or DNS name of the file server that Cisco DCNM uploads
configurations to during a rollback. This field is available only when you
select the Use the following File Server radio button.
Field Description
Name Name of the switch-profile.
Revision ID Current revision number of the switch profile.
Peer IP Address IP address of the peer switch for the selected profile.
Last Session Time Start time of the last configuration session.
Last Session Status Status of the last session action that was performed.
Sync Status Overall sync status of that profile with the peer.
Field Description
vPC Hostname of the vPC primary and secondary switch.
Name Name of the switch profile.
Revision ID Current revision number of the switch profile.
Overall Sync Status Switch profile status on the primary vPC switch.
Last Session Time Start time of the last configuration session.
Last Session Status Status of the last session action that was performed.
Additional References
For additional information related to configuration change management, see the following sections:
• Related Documents, page 11-54
• Standards, page 11-54
Related Documents
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
This chapter describes how to use the Configuration Delivery Management feature in Cisco Data Center
Network Management (DCNM) Web client.
This chapter includes the following sections:
• Information About Configuration Delivery Management, page 12-55
• Licensing Requirements for Configuration Delivery Management, page 12-71
• Prerequisites for Configuration Delivery Management, page 12-71
• Guidelines and Limitations for Configuration Delivery Management, page 12-72
• Platform Support, page 12-72
• Using Configuration Delivery Management, page 12-72
• Field Descriptions for Configuration Delivery Management, page 12-85
• Additional References, page 12-93
• Feature History for Configuration Delivery Management, page 12-94
The Configuration Delivery Management feature allows you to configure Cisco IOS and Cisco NX-OS
features that Cisco DCNM does not support directly in the Cisco DCNM client user interface. For
example, you can use Configuration Delivery Management to configure the Enhanced Interior Gateway
Routing Protocol (EIGRP) for Cisco Nexus 7000 Series devices.
With the Configuration Delivery Management feature, you create and schedule configuration delivery
jobs. Each job can send device configuration commands to one or more devices.
Beginning with Cisco DCNM Release 6.1(1), this feature supports Cisco Catalyst 6500 Series, Cisco
Nexus 1000 Series, Cisco Nexus 1010 Series, Cisco Nexus 3000 Series, Cisco Nexus 4000 Series, Cisco
Nexus 5000 Series, Cisco Nexus 7000 Series, Cisco UCS devices, and Cisco MDS 9000 Series devices.
This section includes the following topics:
• Job Sources, page 12-56
• Delivery Options, page 12-56
Job Sources
Each configuration delivery job is based on a source. This section includes the following topics:
• Template-Sourced Jobs, page 12-56
Template-Sourced Jobs
Template-Sourced Jobs
You can use templates that you create to configure the Cisco IOS and Cisco NX-OS commands to be sent
to destination devices. For configuration delivery jobs based on a template source, you select the desired
template and then configure the parameters for each instance of the template that you add to the job.
Note For information about creating templates, see the System Management Configuration Guide, Cisco
DCNM for LAN, Release 6.x.
For each destination device that is included in the job, you can configure only one instance of the
template.
Note Template-sourced jobs do not support show commands, interactive commands, or commands that give
command progress as output, such as the copy running-config startup-config command.
Delivery Options
For each configuration delivery job, you can specify how Cisco DCNM should respond if a failure occurs
during the job. Cisco DCNM can continue the job regardless of errors, stop the job on all devices that
are included in the job, or stop the job only on the device where the failure occurred but continue the job
on other devices. If a job is delivering the same configuration to many devices, you may want Cisco
DCNM to stop delivering the job to all devices if a single failure occurs, rather than risk delivering the
same configuration error to all devices.
If the devices included in a job support the rollback feature, Cisco DCNM can use the rollback feature
if a failure is encountered during a job. For example, Cisco Nexus 7000 Series devices support the
rollback feature. You can specify that Cisco DCNM rolls back to the previous running configuration on
the device that had the failure only or on all devices included in the job. You can also specify that Cisco
DCNM should roll back to the previous running configuration on the device that had the failure and stop
the job.
You can also specify whether Cisco DCNM delivers the configuration to all devices included in the job
at the same time (parallel delivery) or if it delivers the configuration to devices one at a time (sequential
delivery). While parallel delivery finishes configuring all the devices in a job more quickly, consider
using sequential delivery when you would prefer that Cisco DCNM stop the delivery job to all devices
if a failure occurs.
VDC Support
Cisco DCNM treats each virtual device context (VDC) on a Cisco IOS and Cisco NX-OS device as a
separate device; therefore, Configuration Delivery Management allows you to configure VDCs
independent of the configuration of other VDCs on the same physical device.
Template Format
Each template that you create must have a properties section and a content section. Example 12-1 shows
the required template format.
##template properties
name = template_name ;
description = template_description;
##
##template content
configuration_commands
##
For example:
name = Interface Description Template;
For example:
description = This file specifies the template for setting interface description;
Note Beginning with Cisco DCNM Release 5.2(1), parameter names are not mandatory.
The following example includes the parameter INTF_NAME to allow the interface type and number to
be user specified in a configuration delivery job:
interface $$INTF_NAME$$
Example Template
Example 12-2 shows a template that can be used to apply a description to an interface on a Cisco NX-OS
device. When you create a template-sourced job with this template, you would specify the INTF_NAME,
DESCRIPTION, and SHUT_CMD parameters for each instance of the template in the configuration
delivery job. The INTF_NAME parameter allows the template to be applicable to different interfaces
types, such as port-channel interfaces versus Ethernet interfaces. The DESCRIPTION parameter allows
you to specify an interface description. The SHUT_CMD parameter allows you to specify the shutdown
or no shutdown command.
##template properties
name = Interface Description Template;
description = This file specifies the template for setting interface description;
##
##template content
interface $$INTF_NAME$$
description $$DESCRIPTION$$
$$SHUT_CMD$$
exit
##
Predefined Templates
This section describes the predefined configuration delivery templates that are available in the Cisco
DCNM client. Each template must have a filename that ends with a .template extension, such as
port_security.template.
Cisco DCNM can use templates that are in the templates directory within the archive directory. The
archive directory is specified during server installation. The default location for templates on a Microsoft
Windows server is the following directory:
C:\Program Files\Cisco Systems\dcm\dcnm\data\templates
The default location for templates on a RHEL server is the following directory:
/usr/local/cisco/dcm/dcnm/data/templates
Note All the predefined templates present in DCNM-LAN client can be accessed through the DCNM-Web
client, and vice versa.
To configure a virtual port channel (vPC) template on multiple devices, you must configure peer devices
with peer-link port channels, vPC-enabled port channels, and an access switch with one port channel.
Cisco DCNM provides you with a peer-link access port channel template and a peer-link trunk port
channel template for configuring vPC global configuration settings, peer-link port channels, and virtual
access port channels. You can select one or more devices that you want to configure from the
configuration settings and enter the correct values in the respective fields. For more information about
the field descriptions, see the “Configuration Delivery for Templates: Virtual Port Channel Template”
section on page 12-91.
To configure FCoE Initialization Protocol (FIP) snooping on multiple devices, you must configure a
VLAN and interfaces that connect to an ENODE and Fibre Channel Forwarder (FCF). You can select
one or more devices that you want to configure from the configuration settings for FIP snooping and
enter the correct values in the respective fields. For more information about the field descriptions, see
the “Configuration Delivery for Templates: FIP Snooping Template” section on page 12-87.
FCoE Template
To configure Fibre Channel over Ethernet (FCoE) on multiple devices, you must configure a VLAN, a
VSAN, a virtual Fibre Channel (VFC), and multiple interfaces. You can select one or more devices that
you want to configure from the configuration settings for FCoE and enter the correct values in the
respective fields. For more information about the field descriptions, see the “Configuration Delivery for
Templates: FCoE Template” section on page 12-87.
To configure OTV internal interfaces on multiple devices, you must configure a Internal IFS, a Site
VLANs, and multiple interfaces. You can select one or more devices that you want to configure from the
configuration settings for OTV Internal Interfaces, and enter the correct values in the respective fields.
For more information about the field descriptions, see the “Configuration Delivery for Templates: OTV
Internal Interfaces Template” section on page 12-87.
To configure OTV Multicast on multiple devices, you must configure a Site VLAN, a Site ID, an
Overlay,a control group, and multiple interfaces. You can select one or more devices that you want to
configure from the configuration settings and enter the correct values in the respective fields. For more
information about the field descriptions, see the “Configuration Delivery for Templates: OTV Multicast
Template” section on page 12-87.
To configure OTV Multicast with HSRP Isolation on multiple devices, you must configure a Site VLAN,
a Site ID, an Overlay,a control group, and multiple interfaces. You can select one or more devices that
you want to configure from the configuration settings and enter the correct values in the respective fields.
For more information about the field descriptions, see the “Configuration Delivery for Templates: OTV
Multicast with HSRP Isolation Template” section on page 12-88.
To configure OTV Multicast with VRRP Isolation on multiple devices, you must configure a Site VLAN,
a Site ID, an Overlay,a control group, and multiple interfaces. You can select one or more devices that
you want to configure from the configuration settings and enter the correct values in the respective fields.
For more information about the field descriptions, see the “Configuration Delivery for Templates: OTV
Multicast with VRRP Isolation Template” section on page 12-88.
To configure OTV Unicast with one adjacency server on multiple devices, you must configure a Site
VLAN, a Site ID, an Overlay,a control group, adjacency server, and multiple interfaces. You can select
one or more devices that you want to configure from the configuration settings and enter the correct
values in the respective fields. For more information about the field descriptions, see the “Configuration
Delivery for Templates: OTV Unicast with One Adjacency Server Template” section on page 12-89.
OTV Unicast with One Adjacency Server and HSRP Isolation Template
To configure OTV Unicast with one adjacency server on multiple devices, you must configure a Site
VLAN, a Site ID, an Overlay,a control group, adjacency server, and multiple interfaces. You can select
one or more devices that you want to configure from the configuration settings and enter the correct
values in the respective fields. For more information about the field descriptions, see the “Configuration
Delivery for Templates: OTV Unicast with One Adjacency Server and HSRP Isolation Template” section
on page 12-89.
OTV Unicast with One Adjacency Server and VRRP Isolation Template
To configure OTV Unicast with one adjacency server on multiple devices, you must configure a Site
VLAN, a Site ID, an Overlay,a control group, adjacency server, and multiple interfaces. You can select
one or more devices that you want to configure from the configuration settings and enter the correct
values in the respective fields. For more information about the field descriptions, see the “Configuration
Delivery for Templates: OTV Unicast with One Adjacency Server and VRRP Isolation Template”
section on page 12-89.
To configure OTV Unicast with one adjacency server on multiple devices, you must configure a Site
VLAN, a Site ID, an Overlay,a control group, the primary and secondary adjacency servers, and multiple
interfaces. You can select one or more devices that you want to configure from the configuration settings
and enter the correct values in the respective fields. For more information about the field descriptions,
see the “Configuration Delivery for Templates: OTV Unicast with Two Adjacency Servers Template”
section on page 12-90.
OTV Unicast with Two Adjacency Servers and HSRP Isolation Template
To configure OTV Unicast with one adjacency server on multiple devices, you must configure a Site
VLAN, a Site ID, an Overlay,a control group, the primary and secondary adjacency servers, and multiple
interfaces. You can select one or more devices that you want to configure from the configuration settings
and enter the correct values in the respective fields. For more information about the field descriptions,
see the “Configuration Delivery for Templates: OTV Unicast with Two Adjacency Servers and HSRP
Isolation Template” section on page 12-90.
OTV Unicast with Two Adjacency Servers and VRRP Isolation Template
To configure OTV Unicast with one adjacency server on multiple devices, you must configure a Site
VLAN, a Site ID, an Overlay,a control group, the primary and secondary adjacency servers, and multiple
interfaces. You can select one or more devices that you want to configure from the configuration settings
and enter the correct values in the respective fields. For more information about the field descriptions,
see the “Configuration Delivery for Templates: OTV Unicast with Two Adjacency Servers and VRRP
Isolation Template” section on page 12-91.
To configurevirtual port channel on multiple devices, you must configure a VPC ID, an Channel
number,VLAN account, , and multiple interfaces. You can select one or more devices that you want to
configure from the configuration settings and enter the correct values in the respective fields. For more
information about the field descriptions, see the “Configuration Delivery for Templates: Virtual Port
Channel Template” section on page 12-91.
Zone Template
TTo configurevirtual port channel on multiple devices, you must configure a hostname, storage, VSAN
ID, host , zone set, and multiple interfaces. You can select one or more devices that you want to configure
from the configuration settings and enter the correct values in the respective fields. For more information
about the field descriptions, see the “Configuration Delivery for Templates: Zone Template” section on
page 12-93.
Custom Templates
You can create, edit, and delete custom templates depending on your specific requirements. The user
interface for a custom template is created dynamically based on the template. To create a custom
template, you need to understand the syntax rules that are defined in the Cisco DCNM template
definition file.
RELATED TOPICS
Template Format
Each template that you create must have a properties section and a content section. Example 12-3 shows
the custom template format.
Note When creating or changing a template, ensure that the userDefined property is set to “true.” If the
userDefined property is “false” and the template is deployed, then the template becomes permanent and
cannot be deleted.
##template properties
name = FCOE Template;
description = This file specifies the template configuration for FCOE;
userDefined=true;
##
##template content
feature fcoe
fcoe fcmap $$FC_MAP$$
vsan database
vsan $$VLAN_ID_RANGE$$
exit
For example:
name = FCoE Template;
For example:
description = This file specifies the template for setting FCoE
Note If the supportedPlatforms attribute is not specified, the template is applicable for all
platforms.
Note Beginning with Cisco DCNM Release 5.2(1), parameter names are not mandatory.
The DCNM template engine supports a foreach loop construct. This construct is used for template
configurations that are required for a set of interfaces or VLAN IDs.
The syntax for the construct is a follows:
foreach <FOR_LOOP_VARIABLE> in $$FOR_LOOP_RANGE$$
{<SET of commands with placeholders for a for loop index variable, such as
@FOR_LOOP_VARIABLE>
For example:
##template properties
name = FCOE Template;
description = This file specifies the template configuration for FCOE;
userDefined=false;
##
##template variables
integerRange VLAN_ID_RANGE;
integerRange VFC_PORT_NUM_RANGE;
##
##template content
feature fcoe
If Conditional Construct
The DCNM template engine supports the if | else if | else loop construct. This construct is used for
template configurations that need to be applied based on specific conditions.
Note Make sure that the else if and else blocks start on a new line after an if block.
For example:
##template properties
name = FCOE Template;
description = This file specifies the template configuration for FCOE;
userDefined=false;
##
##template variables
integerRange VLAN_ID_RANGE;
integerRange VFC_PORT_NUM_RANGE;
##
##template content
feature fcoe
if ($$FC_MAP$$) {
## deliver only if there is a valid value given for FC_MAP
fcoe fcmap $$FC_MAP$$
}
vsan database
vsan $$VLAN_ID_RANGE$$
exit
if ($$DEVICE_TYPE$$ == "N7K" && $$ DEVICE_IMG_VERSION$$ == “4.2(3)”) {
<some commands specific to N7K with image version 4.2(3)>
}
else if ($$DEVICE_TYPE$$ == "N7K") {
<commands specific to N7K with any image other than 4.2(3)>
}
else if ($$DEVICE_TYPE$$ == "N5K") {
<commands specific to N5K device>
}
else {
Example Template
Example 12-4 shows a template that can be used to apply a description to configuring FCoE on a Cisco
NX-OS device. When you create a template for configuration delivery management with this template,
you would specify the NAME, DESCRIPTION, VLAN_ID_RANGE, and VFC_PORT_NUM_RANGE
parameters for each instance of the template.
##template properties
name = FCOE Template;
description = This file specifies the template configuration for FCOE;
userDefined=true;
##
##template variables
integerRange VLAN_ID_RANGE;
integerRange VFC_PORT_NUM_RANGE;
##
##template content
feature fcoe
fcoe fcmap $$FC_MAP$$
vsan database
vsan $$VLAN_ID_RANGE$$
exit
##template properties
name = FIP SNOOPING Template;
description = This file specifies the template configuration for FIP Snooping;
userDefined=false;
supportedPlatforms = N4K, N4K;
N4K.supportedImages = 4.1(2)N1(1);
N4K.supportedImages = 4.1(2)N1(1);
##
##template content
feature fip-snooping
vlan $$VLAN_ID$$
fip-snooping enable
fip-snooping fc-map $$FC_MAP$$
exit
interface $$ENODE_INF$$
no fip-snooping port-mode fcf
switchport mode trunk
switchport trunk allowed vlan $$VLAN_ID$$
switchport trunk allowed vlan add $$OLD_VLAN_ID$$
switchport trunk native vlan $$OLD_VLAN_ID$$
spanning-tree port type edge trunk
lldp receive
lldp transmit
exit
interface $$FCF_INF$$
switchport mode trunk
All data types have some metadata properties. The following table shows all the possible metadata
properties for all data types.
An example is regularExpr=.*abc.*.
The following table shows the association of data types and metadata properties.
• Devices must be reachable by Cisco DCNM when Cisco DCNM attempts to deliver the
configuration. A delivery job fails if the device is unreachable by Cisco DCNM.
Platform Support
The following platforms support this feature but might implement it differently. For platform-specific
information, including guidelines and limitations, system defaults, and configuration limits, see the
corresponding documentation.
Platform Documentation
Cisco Catalyst 6500 Series switches Cisco Catalyst 6500 Series Switches Documentation
Cisco Nexus 1000V Series switches Cisco Nexus 1000V Series Switch Documentation
Cisco Nexus 3000 Series switches Cisco Nexus 3000 Series Switch Documentation
Cisco Nexus 4000 Series switches Cisco Nexus 4000 Series Switch Documentation
Cisco Nexus 5000 Series switches Cisco Nexus 5000 Series Switch Documentation
Cisco Nexus 5500 Series switches Cisco Nexus 5500 Series Switch Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switch Documentation
Cisco MDS 9000 Series switches Cisco MDS 9000 Series Switch Documentation
CiscoUCS Series switches Cisco UCS Series Switch Documentation
• Adding a Custom Template in the Cisco DCNM SAN Client, page 12-77
• Changing a Predefined Template (ASCII Text Files), page 12-79
• Changing a Custom Template in the Cisco DCNM Client, page 12-79
• Removing a Predefined Template (ASCII Text Files), page 12-80
• Removing a Custom Template in the Cisco DCNM Client, page 12-81
• Refreshing Cisco DNCM Servers with Template Updates (ASCII Text Files), page 12-81
• Configuring Job Delivery Options, page 12-83
• Scheduling a Configuration Delivery Job, page 12-84
• Removing a Configuration Delivery Job, page 12-84
Step 1 Select a Add a configuration delivery job of the type that you need.
For more information, see the “Adding a Configuration Delivery Job” section on page 12-74.
Step 2 Add one or more destination devices for the job.
For more information, see the “Adding a Predefined Template (ASCII Text Files)D” section on
page 12-76.
Step 3 Configure the Cisco IOS and Cisco NX-OS commands to be delivered to the destination devices by the
job. More information for doing so varies depending upon the type of job, as follows:
• For a job with manually entered Cisco IOS or Cisco NX-OS commands, see the “Adding a
Predefined Template (ASCII Text Files)D” section on page 12-76.
• For a job with Cisco IOS or Cisco NX-OS commands retrieved from a source device, see the
“Adding a Predefined Template (ASCII Text Files)D” section on page 12-76.
• For a job with Cisco IOS or Cisco NX-OS commands from a Cisco DCNM template, see the
“Adding a Predefined Template (ASCII Text Files)D” section on page 12-76.
Note Before you can add a template-source job, you must add templates to Cisco DCNM. For
more information, see the “Configuration Delivery Templates and the Cisco DCNM Client”
section on page 12-59.
Step 4 (Optional) Configure job delivery options, which determine the following:
• How Cisco DCNM responds if a delivery job results in configuration errors on a device.
• Whether Cisco DCNM delivers Cisco IOS or Cisco NX-OS commands to all devices in the job at
the same time or one device at a time.
For more information, see the “Configuring Job Delivery Options” section on page 12-83.
Step 5 Schedule the job.
For more information, see the “Scheduling a Configuration Delivery Job” section on page 12-84.
RELATED TOPICS
Note that only template based jobs can be created. For more information about job types, see the “Job
Sources” section on page 12-56.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Config > Delivery > Templates..
The Summary pane lists the configuration delivery templates that are configured in Cisco DCNM, if any.
For more informtion see Adding a Predefined Template (ASCII Text Files)D, page 12-76
Step 2 Select a template and click on the Launch Job button to display the Config Job Wizard.
Step 3 Select the device to which you want to assign the template.
For more information see Selecting a Device, page 12-75
Step 4 Define variables for the template.
For more information see
Step 5 Preview the configuration in the preview pane. For more information see Previewing a Configuration,
page 12-76
Step 6 Schedule a job. For more information see Scheduling a Configuration Delivery Job, page 12-84.
Step 7 Click Finish to complete the configuration delivery job creation..
Note You may be unable to deploy the job until after you have further configured the job.
RELATED TOPICS
Selecting a Device
You can select a device to be associated with the template.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Config > Delivery > Templates..
The Summary pane lists the configuration delivery templates that are configured in Cisco DCNM, if any.
For more informtion see Adding a Predefined Template (ASCII Text Files)D, page 12-76
Step 2 Select a template and click on the Launch Job button to display the Config Job Wizard.
Step 3 Click on the Next button to display the device selection screen.
Step 4 Select the Device Scope from the drop down list. It lists the all the devices available for selected
template.
Step 5 You can view the Device, IP Address, Group, Platform, and the Version. Select the device to which
you want to assign the template.
Step 6 Click Next.
Defining Variables
You can define variables for the selected device and the corresponding template.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Config > Delivery > Templates..
The Summary pane lists the configuration delivery templates that are configured in Cisco DCNM, if any.
For more informtion see Adding a Predefined Template (ASCII Text Files)D, page 12-76
Step 2 Select a template and click on the Launch Job button to display the Config Job Wizard.
Step 3 Click on the Next button to display the device selection screen.
Step 4 After selecting the device for the template, set the variables for the device and the template.
Step 5 Enter the VSAN_ID, SLOT_NUMBER, PORT_RANGE, and the VFC_PREFIX.
Step 6 Select the Edit variables per device checkbox to set the variables for each individual devices selected
for the template.
Step 7 You either keep the values global for all the devices in the list, or change the individual values in the
respective rows.
Step 8 Click Next.
Previewing a Configuration
You can preview the confiuration for each device.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Config > Delivery > Templates..
The Summary pane lists the configuration delivery templates that are configured in Cisco DCNM, if any.
For more informtion see Adding a Predefined Template (ASCII Text Files)D, page 12-76
Step 2 Select a template and click on the Launch Job button to display the Config Job Wizard.
Step 3 Click on the Next button to display the device selection screen.
Step 4 After setting the variables for the selected devices and the templates, you can preview the configuration.
Step 5 Selecta a device fron the drop down list to preview the configuration.
Step 6 Click Next.
Review the “Configuration Delivery Templates (ASCII Text Files)” section on page 12-57.
DETAILED STEPS
Step 1 Create the template file, ensuring that it meets the template requirements and includes the configuration
commands that you need.
Step 2 Place a copy of the template file in the templates directory. The templates directory is in the archive
directory that was specified during Cisco DCNM server installation. For Microsoft Windows, the path
to the default templates directory is C:\Program Files\Cisco Systems\dcm\dcnm\data\templates. For
RHEL, the default path is /usr/local/cisco/dcm/dcnm/data/templates.
Step 3 Refresh the Cisco DCNM server. If you have a clustered-server Cisco DCNM deployment, you must
refresh only the master server of the cluster.
For more information, see the “Refreshing Cisco DNCM Servers with Template Updates (ASCII Text
Files)” section on page 12-81.
The new template is now available when you create a template-sourced configuration delivery job.
DETAILED STEPS
Step 1 From the Features Selector pane, choose Configuration Delivery > Templates .
The Summary pane lists the custom templates that are configured in the Cisco DCNM, if any.
Step 2 From the menu bar, choose Create New Config Template.
The fields for the new template appears in the Config Template pane.
Step 3 In the pane for the new template, enter the Template Name, Template Description, and Tags for the
template.
Step 4 Select the appropriate check boxes for the Supported Platforms field.
Step 5 Click the Validate Template Syntax button to verify that the template does not contain errors.
If errors exist, the errors in the template are identified with red indicators in the Details pane. Cisco
DCNM does not allow you to save a template that contains errors.
Step 6 Click Save to save the template details.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Features Selector pane, choose Config Delivery > Templates .
The Summary pane lists the custom templates that are configured in the Cisco DCNM, if any.
Step 2 From the menu bar, choose Import. The folder browser option is displayed.
Step 3 Navigate and select the target folder and the file.
Step 4 Once the file is selected, click OK. The selected template is imported into the DCNM and will be
available for scheduling configuration deliveyr jobs.
Note The template will be validated and if there are any errors then a warning message is displayed.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Features Selector pane, choose Config Delivery > Templates .
The Summary pane lists the custom templates that are configured in the Cisco DCNM, if any.
Step 2 From the menu bar, choose Export. The folder browser option is displayed.
Step 3 Navigate and select the target folder and enter the file name for the template.
Step 4 Click OK., to export the selected template to the target folder.
RELATED TOPICS
Review the “Configuration Delivery Templates (ASCII Text Files)” section on page 12-57.
DETAILED STEPS
Step 1 Locate the template file in the templates directory. The templates directory is in the archive directory
that was specified during Cisco DCNM server installation. For Microsoft Windows, the path to the
default templates directory is C:\Program Files\Cisco Systems\dcm\dcnm\data\templates. For RHEL,
the default path is /usr/local/cisco/dcm/dcnm/data/templates.
Step 2 Open the template file in a text editor and make the required changes.
Step 3 Save and close the template file.
Note If you have a clustered-server Cisco DCNM deployment, you must change the template file on
each Cisco DCNM server in the cluster.
Step 4 Refresh the Cisco DCNM server. If you have a clustered-server Cisco DCNM deployment, you must
refresh each server in the cluster.
For more information, see the “Refreshing Cisco DNCM Servers with Template Updates (ASCII Text
Files)” section on page 12-81.
The changed template is now available when you create a template-sourced configuration delivery job.
DETAILED STEPS
Step 1 From the Features Selector pane, choose Config Delivery > Templates .
The Summary pane lists the custom templates that are configured in the Cisco DCNM, if any.
Step 2 From the list of template, select one and choose Modify.
The fields for the template appears in the Config Template pane.
Step 3 In the pane for the selected template, enter the Template Name, Template Description, and Tags for
the template.
Step 4 Select the appropriate check boxes for the Supported Platforms field.
Step 5 Click the Validate Template Syntax button to verify that the template does not contain errors.
If errors exist, the errors in the template are identified with red indicators in the Details pane. Cisco
DCNM does not allow you to save a template that contains errors.
Step 6 Click Save to save the template details.
RELATED TOPICS
DETAILED STEPS
Step 1 Locate the template file in the templates directory at the following location:
INSTALL_DIR\jboss-4.2.2.GA\server\dcnm\cisco\templates
For Microsoft Windows, the path to the default Cisco DCNM installation directory is C:\Program
Files\Cisco Systems. For RHEL, the default path is /usr/local/cisco.
Step 2 Delete or remove the template file from the templates directory.
Note If you have a clustered-server Cisco DCNM deployment, you must remove the template file from
the templates directory on each Cisco DCNM server in the cluster.
Step 3 Refresh the Cisco DCNM server. If you have a clustered-server Cisco DCNM deployment, you must
only refresh the master server.
For more information, see the “Refreshing Cisco DNCM Servers with Template Updates (ASCII Text
Files)” section on page 12-81.
The removed template is no longer available when you create a template-sourced configuration delivery
job.
DETAILED STEPS
Step 1 From the Features Selector pane, choose Config Delivery> Templates .
The Summary pane lists the custom templates that are configured in the Cisco DCNM, if any.
Step 2 From the list of template, select one.The fields for the template appears in the Config Template pane.
Step 3 From the menu bar choose Delete .
Step 4 Click Save to save the template details.
RELATED TOPICS
Refreshing Cisco DNCM Servers with Template Updates (ASCII Text Files)
After you have made updates to templates (ASCII text files), including adding, changing, or removing
templates, you must refresh the template list before users can see the updates in the Cisco DCNM client.
This procedure allows you to refresh a Cisco DCNM server with updates to templates without requiring
a server stop and start. If you stop and start a Cisco DCNM server after updating templates, you do not
need to perform this procedure.
Note When updating templates with the Cisco DCNM client, the Cisco DCNM server is updated
automatically. You do not have to manually refresh the Cisco DCNM server.
DETAILED STEPS
Note If you have a clustered-server deployment, ensure that you are performing these steps on the
master server.
Step 2 Use the cd command to change the directory to the following location:
INSTALL_DIR\dcm\jboss-4.2.2.GA\bin
For Microsoft Windows, the path to the default Cisco DCNM installation directory is C:\Program
Files\Cisco Systems. For RHEL, the default path is /usr/local/cisco.
Step 3 Enter the following command:
set JAVA_HOME=INSTALL_DIR \dcm\java\jre1.6
For example, on a Microsoft Windows server with Cisco DCNM installed in the default directory, you
would enter the following command:
set JAVA_HOME=C:\Program Files\Cisco Systems\dcm\java\jre1.61
On a RHEL server with Cisco DCNM installed in the default directory, you would enter the following
command:
set JAVA_HOME=/usr/local/cisco/dcm/java/jre1.6
For example, on a RHEL server using the default Naming Service port and the IP address 10.0.0.0, you
would enter the following command:
twiddle.sh -s 10.0.0.0:1099 invoke "com.cisco.dcbu.dcm:service=ConfigDeliveryService"
populateTemplates
The Cisco DCNM server begins using the updates to the templates.
Step 5 (Optional) To see the updates to the templates in the Cisco DCNM client, press F5 to refresh the screen.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Config Job Wizard > VLAN Template.
The VLAN Template pane with the list of tasks is displayed.
Step 2 The Welcome screen displays the steps involvedconfiguring the job.
Step 3 Click Next to display the Select Devices screen.
Step 4 Select a device from the list to deliver the configuration.
Step 5 Click Next to display the Define Variables screen. You can enter the values for the selcted template in
the Define Variables screen.
Note Select the Edit variables per device check box to set the attributes individually to each device.
Else, you can globally configure the attributes to all the devices displayed in the list. Basic
validation will be performed for the defined variabledand the errors are displayed.
Step 6 Click Next to preview the configuration to be delivered in the Preview Config screen.
Step 7 Click Next to display the configuration page, in Schedule Job screen. For more details, see Scheduling
a Configuration Delivery Job section.
RELATED TOPICS
Determine when you want Cisco DCNM to run the configuration delivery job.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Config Job Wizard > Template.
Step 2 After entering the details in the Welcome, Select Devices, Define Variables, and Preview Config
screens, click Next to display the Schedule Job screen.
Step 3 Enter the job description , device credentials, time, transaction options, and the delivery options.
Step 4 Click Finish to finish the configuration.
Step 5 Choose Config Delivery > Jobs to check on the status of the running configuration delivery jobs.You
can also change the scheduled time by editing the value in the Scheduled At column.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Config Delivery> Jobs.
The Summary pane lists the configuration delivery jobs that are configured in Cisco DCNM.
Step 2 Click the configuration delivery job check box that you want to remove.
Step 3 From the menu bar, click the Delete Job button.
Step 4 Click Yes.
Cisco DCNM removes the configuration delivery job. You do not need to save your changes.
Field Description
Device Specifies the device name.
VLAN_ID Specifies the VLAN ID.
FC_MAP Specifies the FC_MAP.
ENODE_INF Specifies the ENODE_INF.
OLD_VLAN_ID Specifies the previous VLAN ID.
FCF_INF Specifies the FCF information.
Field Description
Transaction Options
Enable Rollback Specifies whether Cisco DCNM uses the Cisco IOS or the Cisco NX-OS
rollback feature to recover from failures on devices during configuration
delivery. By default, this check box is unchecked.
Note Cisco DCNM can perform a rollback only on devices that support a
configuration rollback, such as Cisco Nexus 7000 Series devices.
Rollback the Specifies that Cisco DCNM should roll back the running configuration of the
configuration on the device that had the failure to the previous running configuration. If there are
device if there is any other devices in the delivery job, the job continues on devices that did not
failure in that device have a failure.
This field appears when the Enable Rollback check box is checked.
Rollback the Specifies that Cisco DCNM should roll back the running configuration of all
configuration in all the devices included in the job if a failure occurs on a device. This option is
selected devices if there particularly useful if the job is configured for parallel delivery.
is any failure in any
This field appears when the Enable Rollback check box is checked.
device
Rollback the Specifies that Cisco DCNM should roll back the running configuration of the
configuration on the device that had the failure and should not continue to deliver the job to
device, if there is any devices that have not received the configuration yet. This option is
failure in that device particularly useful if the job= is configured for sequential delivery.
and stop further
This field appears when the Enable Rollback check box is checked.
configuration delivery
to the remaining devices
Delivery Order
Deliver configuration to Specifies that Cisco DCNM delivers the configuration to devices included in
one device at a time in the job in a serial delivery. This option is particularly helpful if you have
sequence configured the job to stop after the first failure.
Deliver configuration to Specifies that Cisco DCNM delivers the configuration to all devices included
all devices in parallel at in the job in parallel. This option delivers the configuration to the devices in
the same time the job faster than serial delivery.
Post Delivery Options
Copy run to start Specifies that Cisco DCNM copy the running configuration to the startup
configuration. By default, this checkbox is unchecked.
Field Description
VLAN_ID ID for the VLAN
VSAN_ID ID for the VSAN
FC_MAP Value of FC mapping
VFC_NUMBER_RANGE Valid range for the VFC
Field Description
VLAN_RANGE Valid VLAN range
ENODE_INTERFACE_RANGE Valid values for the ENODE interface range
FCF_INTERFACE_RANGE Valid values for the FCF interface range
FC_MAP Value of FC mapping
Field Description
INTERNAL_IFS Specifies the internal IFS.
SITE_VLAN Specifies the site vlan.
OTV_VLANS Specifies the OTV vlan.
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
OVERLAY_ID Specifies the overlay ID.
JOIN_INTF Specifies the interface information.
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
CONTROL_GROUP_IP Specifies the IP of the control group for multicast.
DATA_GROUP_NETWORK Specifies the data group network.
OTV_VLAN Specifies the OTV vlan ID.
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
OVERLAY_ID Specifies the overlay ID.
JOIN_INTF Specifies the interface information.
CONTROL_GROUP_IP Specifies the IP of the control group for multicast.
DATA_GROUP_NETWORK Specifies the data group network.
OTV_VLAN Specifies the OTV vlan ID.
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
OVERLAY_ID Specifies the overlay ID.
JOIN_INTF Specifies the interface information.
CONTROL_GROUP_IP Specifies the IP of the control group for multicast.
DATA_GROUP_NETWORK Specifies the data group network.
OTV_VLAN Specifies the OTV vlan ID.
Configuration Delivery for Templates: OTV Unicast with One Adjacency Server
Template
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
OVERLAY_ID Specifies the overlay ID.
JOIN_INTF Specifies the interface information.
ADJACENCY_SERVER Specifies the IP of the adjacency server.
PRIMARY_ADJACENCY_SER Specifies the IP of the primary adjacency server.
VER
OTV_VLAN Specifies the OTV vlan ID.
Configuration Delivery for Templates: OTV Unicast with One Adjacency Server
and HSRP Isolation Template
Table 12-13 OTV Unicast with One Adjacency Server and HSRP Isolation Template
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
OVERLAY_ID Specifies the overlay ID.
JOIN_INTF Specifies the interface information.
IS_ADJACENCY_SERVER Specifies the IP of the adjacency server.
PRIMARY_ADJACENCY_SER Specifies the IP of the primary adjacency server.
VER
OTV_VLANS Specifies the OTV vlan ID.
Configuration Delivery for Templates: OTV Unicast with One Adjacency Server
and VRRP Isolation Template
Table 12-14 OTV Unicast with One Adjacency Server and VRRP Isolation Template
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
Table 12-14 OTV Unicast with One Adjacency Server and VRRP Isolation Template
Field Description
OVERLAY_ID Specifies the overlay ID.
JOIN_INTF Specifies the interface information.
IS_ADJACENCY_SERVER Specifies the IP of the adjacency server.
PRIMARY_ADJACENCY_SER Specifies the IP of the primary adjacency server.
VER
OTV_VLAN Specifies the OTV vlan ID.
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
OVERLAY_ID Specifies the overlay ID.
JOIN_INTF Specifies the interface information.
IS_ADJACENCY_SERVER Specifies the IP of the adjacency server.
PRIMARY_ADJACENCY_SER Specifies the IP of the primary adjacency server.
VER
SECONDARY_ADJACENCY_S Specifies the IP of the secondary adjacency server.
ERVER
OTV_VLAN Specifies the OTV vlan ID.
Table 12-16 OTV Unicast with Two Adjacency Servers and HSRP Isolation Template
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
OVERLAY_ID Specifies the overlay ID.
JOIN_INTF Specifies the interface information.
IS_ADJACENCY_SERVER Specifies the IP of the adjacency server.
Table 12-16 OTV Unicast with Two Adjacency Servers and HSRP Isolation Template
Field Description
PRIMARY_ADJACENCY_SER Specifies the IP of the primary adjacency server.
VER
SECONDARY_ADJACENCY_S Specifies the IP of the secondary adjacency server.
ERVER
OTV_VLAN Specifies the OTV vlan ID.
Table 12-17 OTV Unicast with Two Adjacency Servers and VRRP Isolation Template
Field Description
SITE_VLAN Specifies the site vlan.
SITE_ID Specifies the site ID.
OVERLAY_ID Specifies the overlay ID.
JOIN_INTF Specifies the interface information.
IS_ADJACENCY_SERVER Specifies the IP of the adjacency server.
PRIMARY_ADJACENCY_SER Specifies the IP of the primary adjacency server.
VER
SECONDARY_ADJACENCY_S Specifies the IP of the secondary adjacency server.
ERVER
OTV_VLAN Specifies the OTV vlan ID.
Field Description
DOMAIN_ID vPC Domain ID
ACC_VLAN Access VLAN ID
PO_NO Port channel ID
SRC_IP Peer keepalive source IP address
DEST_IP Peer keepalive destination IP address
VRF Name of the VRF
Field Description
INTF_MODE Link Aggregation Protocol mode
INTF_NAME_RANGE Range of valid member ports of the port channel
Field Description
DOMAIN_ID vPC Domain ID
ALL_VLAN Range of VLANs that are allowed on the port channel
NAT_VLAN ID of the native VLAN
PO_NO Port channel ID
SRC_IP Peer keepalive source IP address
DEST_IP Peer keepalive destination IP address
VRF Name of the VRF
INTF_MODE Link Aggregation Protocol mode
INTF_NAME_RANGE Range of valid member ports of the port channel
Field Description
vPC_ID vPC ID
PO_NO IP address of the port channel
ACC_VLAN Access VLAN ID
INTF_NAME_RANGE Range of valid port channels of the member ports
INTF_MODE Link Aggregation Protocol mode
Field Description
vPC_ ID vPC ID
PO_NO IP address of the port channel
ALL_VLAN Range of VLAN allowed on the port channel
NAT_VLAN ID of the native VLAN
INTF_RANGE Range of valid port channels of the member ports
INTF_MODE Link Aggregation Protocol mode
Field Description
HOSTNAME Specifies the host name of the device.
STORAGE The storage IP.
HOST_PWWN The post world wide name of the host.
STORAGE_PWWN The post world wide name of the storage device.
VSAN_ID Specifies the vsan ID.
FABRIC A Specifies the name of Fabric A.
FABRIC B Specifies the name of Fabric A.
HOST_IF Specifies the host interface.
HOST_MODULE Specifies the name of the host module.
STORAGE_IF Specifies the storage interface.
STORAGE_MODULE Specifies the name of the storage module.
ZONESET Specifies the name of the zone set.
Additional References
For additional information related to configuration delivery management, see the following sections:
• Related Documents, page 12-93
• Standards, page 12-94
Related Documents
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
Archival Jobs
See Configuration Change Management
Archival Settings
See Configuration Change Management
CDP
defined with LLDP 6-1
chassis
CPU utilization 3-6
details 3-6
displaying information about 3-6
environmental status 3-6
events 3-6
memory utilization 3-6
Configuration Change Management
archival history 8-7
Archival Jobs 8-16
Archival Settings 8-19
archival status 8-7
archiving a running configuration 8-9
browsing versions 8-8
commenting on a version 8-8
comparing versions 8-10
comparison tools 8-12
configuring an archival job 8-16
configuring switch profiles 8-21
deleting an archival job 8-18
deleting archived configurations 8-15
description 8-1
events
overview 1-2
Events Browser
adding a note 2-7
changing event status 2-7
deleting an event 2-8
description 2-1
filtering events 2-5
viewing events 2-3
Events tab
adding a note 2-7
changing event status 2-7
deleting an event 2-8
description 2-1
viewing events 2-5
fan trays
details 3-8
displaying information about 3-7
events 3-8
feature history
Configuration Change Management 8-29
Configuration Delivery Management 9-36
Device OS Management 7-18
inventory 3-11
LLDP 6-5
power usage 3-11
field descriptions
Configuration Change Management 8-24
Configuration Delivery Management 9-30
Device OS Management 7-15
File Servers
See Device OS Management
high availability
LLDP 6-2
SPAN 5-3
inventory
chassis information 3-6
definition 3-1
fan tray information 3-7
feature history 3-11
licensing requirements 3-3
module information 3-6
module pre-provisioning 3-3
module pre-provisioning, FEX modules 3-5
module pre-provisioning, offline module 3-4
module pre-provisioning, online module 3-4
overview 1-2
power supply information 3-7
reloading a linecard 3-5
job sources
Configuration Delivery Management 9-2
licensing requirements
Configuration Delivery Management 9-15
inventory 3-3
LLDP 6-2
SPAN 5-3
LLDP
defined 6-1
description 6-1
modules
details 3-7
displaying information about 3-6
environmental status 3-7
events 3-7
TCAM statistics 3-7
overview 1-1
platform support
Configuration Delivery Management 9-16
power supplies
details 3-7
displaying information about 3-7
events 3-7
power usage
description 3-2
displaying details about 3-9
displaying statistics about 3-9
displaying summary information about 3-8
feature history 3-11
server connections
configuring vCenter Server connections 4-9
deleting vCenter Server connections 4-10
Software Image Management
See Device OS Management
software installation job
See Device OS Management
SPAN
configuring an RSPAN VLAN 5-7
configuring a session 5-4
configuring a virtual SPAN session 5-6
description 5-1
destination field descriptions (table) 5-9
enabling a session 5-8
high availability 5-3
licensing requirements 5-3
multiple sessions 5-3
overview 1-2
session destinations 5-4
session field descriptions (table) 5-8
sessions 5-2
template requirements
Configuration Delivery Management 9-3
vCenter Server
connecting to 4-10
disconnecting from 4-10
removing host mapping 4-11
vCenter Server connections
configuring 4-9
deleting 4-10
VEMS
removing host mapping from vCenter Server 4-11
Version Browser
See Configuration Change Management
Virtual Ethernet Modules
See VEMs.
virtual switch
changing domain to Layer 2 control 4-7
changing domain to Layer 3 control 4-6
configuring a control interface 4-12
configuring domain with Control VLAN 4-7
configuring domain with Packet VLAN 4-8
configuring vCenter connections 4-9
creating domains with Layer 2 control 4-4
creating domains with Layer 3 control 4-5
deleting vCenter connections 4-10
description 4-1
displaying details 4-13