B DCNM San
B DCNM San
B DCNM San
0(1)
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)
© 2018 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 1 Overview 1
Cisco Data Center Network Manager 1
CHAPTER 2 Dashboard 3
Summary Dashboard 3
Dashlets 4
Network Dashboard 6
Switch Dashboard 7
Installing a Switch License 9
Storage Dashboard 10
Viewing Storage Enclosures Information 10
Viewing Storage Systems Information 10
Viewing Storage Enclosure Events 15
Viewing Storage Enclosure Topology 16
SAN Insights 16
Prerequisites 17
Guidelines and Limitations 17
SAN Insights Dashboard 17
Viewing SAN Insights Metrics 18
ECT Analysis 20
Data table 21
Verifying the Pipeline Service 23
Compute 23
Viewing Host Enclosures 24
Viewing Host Events 25
CHAPTER 3 Topology 27
Topology 27
Status 27
Scope 27
Searching 28
Quick Search 28
Host name (vCenter) 28
Host IP 29
Host MAC 29
VLAN 29
VSAN ID/Name 29
Show Panel 29
Layouts 30
Zooming, Panning and Dragging 31
Switch Slide-Out Panel 31
Beacon 31
Tagging 31
More Details 31
Link Slide-Out Panel 31
24 Hour Traffic 31
CHAPTER 4 Inventory 33
Viewing Inventory Information 33
Viewing Inventory Information for Switches 33
Viewing System Information 35
Viewing Device Manager Information 36
Interfaces 36
VLAN 38
FEX 40
VDCs 43
Switch On-Board Analytics 50
Adding a Fabric 58
Deleting a Fabric 59
Editing a Fabric 59
Rediscovering a Fabric 60
Purging a Fabric 61
CHAPTER 5 Monitor 65
Monitoring Switch 65
Viewing Switch CPU Information 65
Viewing Switch Memory Information 66
Viewing Switch Traffic and Errors Information 66
Viewing Switch Temperature 66
Monitoring SAN 69
Monitoring ISL Traffic and Errors 69
Viewing Performance Information for NPV Links 70
Viewing Inventory Information for VSANs 71
Generating a Report 90
Creating SAN User Defined Reports 91
CHAPTER 6 Configure 97
Templates 97
Template Library 97
Template Library 97
Configuring Jobs 118
Backup 119
Switch Configuration 119
Copy Configuration 120
View Configuration 121
Delete Configuration 121
Compare Configuration Files 121
Export Configuration 122
Import Configuration File 122
Restore Configuration 123
Archive Jobs 124
Archives 127
Compare Configuration Files 128
View Configuration 128
Network Config Audit 129
Prerequisites 192
Guidelines and Limitations 193
Configuring SAN Insights 193
• User Role: Displays the role of the current logged-in user, for example, admin.
• Gear icon: Displays information about DCNM, enables you to change DCNM UI password, and allows
you to log out from DCNM UI.
Summary Dashboard
The intent of the Summary dashboard is to enable network and storage administrators to focus on particular
areas of concern around the health and performance of data center switching. This information is provided as
24-hour snapshots. The functional view of LAN and SAN switching consists of six dynamic portlets that
display information in the context of the selected scope by default. The scope can be adjusted in the upper
right corner of the window to display focused information that is particular to the managed domain, and offers
details of a specific topology or set of topologies that are a part of the data center scope.
The various scopes that are available on the Cisco Data Center Network Manager (DCNM) web interface are:
• Data Center
• Default_SAN
• Default_LAN
• Each SAN Fabric
• Custom scopes created by users
From the left menu bar, choose Dashboard > Summary. The Summary window displays the default dashlets.
The following are the default dashlets that appear in the Summary dashboard page:
• Alarms
• Data Center
• Network Map
• Link Traffic
• Audit Log
• Server Status
From the Dashlets drop-down list, you can choose additional dashlets so that they are added to the Summary
dashboard.
The panels can be added, removed and dragged around to re-order.
Dashlets
By default, a subset of the available dashlets is automatically displayed in the dashboard. To add a dashlet
that is not automatically displayed to a dashboard, from the Cisco DCNM Web UI, perform the following
steps:
Procedure
Dashlet Description
Data Center Displays the number of access, spine and leaf devices,
and a generic health score for each switch group in
the current scope. Devices are aggregated by type
within a switch group.
Network Map Displays the populated switch groups that are visible
in a user Role Based Access Control (RBAC) scope
on a world map. If you use the scope selector, it limits
the set of switch groups displayed. If you use the
pop-up option, the map opens in a new tab and can
be configured.
• The network map dialog box has properties that
are different from the Summary dashboard view:
• You can click and drag nodes to move them
around the map. The map saves their new
positions.
Dashlet Description
• You can double click a node to trigger a slider
that contains the summary inventory information
pertaining to a specific switch group.
• You can upload an image of your choice as the
background to the network map.
Top ISLs/Trunks Displays the performance data for the top ten
performing ISLs, trunk ports or both. Each entry
shows the current average receive and transmit
percentage, with a graph depicting the percentage of
time each trunk spent exceeding the currently
configured thresholds.
Top SAN End Ports (SAN only) Displays the performance data for the top ten
performing SAN host and storage ports. Each entry
shows the current receive and transmit percentage,
with a graph depicting the percentage of time each
trunk spent exceeding the currently configured
thresholds.
Note This dashlet is only for SAN.
Dashlet Description
Info, or Debug) to view a summary of the
corresponding events and descriptions.
Discards Displays the error packets that are discarded for the
selected interface.
Note The Discards dashlet is only for LAN.
Note To restore the default dashlets in the dashboard page, click the Default Set link in the Dashlet
drop-down list.
Network Dashboard
Cisco DCNM enables you to view details of switches including system information, switch capacity, modules,
interfaces, and licenses.
Procedure
Step 1 To access the Network dashboard, from the left menu bar, choose Dashboard > Network.
An inventory of all the switches that are discovered by Cisco DCNM is displayed.
The following table describes the fields that appear on this page.
Field Description
Step 2 Select a switch in the Device Name column to view the Switch Dashboard.
Switch Dashboard
The switch dashboard displays the details of the selected switch.
Procedure
Step 1 From Cisco DCNM home page, choose Dashboard > Network. Alternatively, from Cisco DCNM home
page, you can choose Inventory > View > Switches.
An inventory of all the switches that are discovered by Cisco DCNM is displayed.
Click Health to access the Health score screen, which includes health score calculation and health trend.
The popup contains Overview, Modules, Switch Ports, and Events tabs.
From Cisco DCNM Release 11.0(1), you can view the vPC details of the selected switch in the System
Info tab for LAN switches. It includes details of vPC domain ID, role, peer, peer-link state, keep alive
state, consistency state, send interface, and receive interface. Click the vPCs Configured link to view the
vPC configuration details of the selected switch.
• (Optional) Click SSH to access the switch through Secure Shell (SSH).
• (Optional) Click Device Manager to view a graphical representation of Cisco MDS 9000 Family
switch chassis, a Cisco Nexus 5000/7000/9000 Series switch chassis including the installed switching
modules, the supervisor modules, the status of each port within each module, the power supplies,
and the fan assemblies.
• (Optional) Click HTTP to access the switch through Hypertext Transfer Protocol (HTTP) for that
switch.
• (Optional) Click Accounting to go to the Viewing Accounting Information , on page 68 window
pertaining to this switch.
• (Optional) Click Backup to go to the Viewing a Configuration window.
• (Optional) Click Events to go to the Viewing Events Registration, on page 217 window.
• (Optional) Click Show Commands to display the device show commands. The Device Show
Commands page helps you to view commands and execute them.
• (Optional) Click Copy Running Config to Startup Config to copy the running configuration to
the startup configuration.
• VDC—Allows you to create and manage VDCs. As Cisco DCNM supports Cisco Nexus 7000 Series
only, click an active Cisco Nexus 7000 switch. After you create a VDC, you can change the interface
allocation, VDC resource limits, and the high availability (HA) policies.
• Switch On-Board Analytics—Displays the switch on-board analytics charts containing the following
information:
• Top 10 Slowest Ports
• Top 10 Slowest Target Ports
• Top 10 Slowest Flows
• Top 10 Slowest ITLs
• Top 10 Port Traffic
• Top 10 Target Ports Traffic
• Top 10 Flow Traffic
• Top 10 ITL Traffic
Procedure
Step 1 Choose Dashboard > Network, and select a switch in the Device Name column. Alternatively, you can
choose Inventory > View > Switches.
Step 2 Click License in the switch dashboard.
Step 3 Click Install to install the switch license file on a switch.
A Switch License Install window appears.
Step 4 Click Select License File, and select the license file from your local system.
Step 5 Select the transport method. The available options are:
• TFTP
• SCP
• SFTP
Step 6 Enter the username and password to connect to the DCNM server.
Step 7 Click Install.
Storage Dashboard
The Storage dashboard provides information about the SAN and LAN storage.
To access the Storage dashboard, from the left menu bar, choose Dashboard > Storage.
Procedure
Step 4 Click the Filter icon to filter the storage enclosures by Name or by IP Address.
Step 5 In the Traffic pane, the Enclosure Traffic is displayed by default. Click the Traffic Utilization icon to view
the traffic utilization. The daily average percentage of traffic utilization of the enclosure ports is displayed as
a pie chart.
Clicking on an individual port slice of the pie chart displays specific traffic utilization details for that port.
Procedure
Note • The datasource must be configured and discovered at least once to display the discovered
storage system(s).
• Cisco DCNM now differentiate Block Storage and Filer Storage in terms of what it discovers
and displays. Filer storage has additional elements: Shares, Quotas, and Q-trees.
• Shares: Individual storage folders on the file server to which users have access.
• Quotas: File and repository size limitations.
• Q-trees: Tree based quotas. By using Q-trees, you can partition data and take advantage
of different backup strategies, security styles, and settings.
Step 3 Click the Click to see more details... icon to view the storage systems summary.
The following are the elements of the Storage Systems area:
Components
Components are containers for a set or sub-set of the disks in a storage system. The Component elements
view displays a table of the disks in the collection, total number of disks managed and a summary of the
collection’s used vs. raw space.
Procedure
Step 1 Use the Storage System drop-down to select the storage system.
Step 2 The right-hand pane displays a summary of the storage components. Click each name to go to the item in the
left menu
Step 3 Hover the mouse cursor on the graph to display its details.
Step 4 In the left-hand pane, select the storage component to view its details.
The number of disks managed along with its details are displayed.
Step 5 Click a Serial Number to display the disk and the mapped LUNs details.
Step 6 You can use the search box to search for a specific component.
Pools
Pools are user-defined collections of LUNs displaying the pool storage. The pools elements view displays a
summary of the pools, lists the LUNs in the pool, and also displays the total managed and raw space.
Procedure
Step 1 Use the Storage System drop-down to select the storage system.
The bar graph next to each pool indicates the total managed space of that pool.
Step 3 You can use the search box to search for a specific pool.
LUNs
LUNs refer to a storage volume or a collection of volumes that are abstracted into a single volume. It is a unit
of storage which can be pooled for access protection and management. Each LUN in the LUN Element View
is displayed along with the mapping from Hosts to LUNs. If the associated Fabric has also been discovered,
additional information concerning the end-to-end connection between a host and LUN is also displayed.
You are able to create and delete LUNs, create and delete host and LUN maps, and create zoning for HLMs.
Procedure
Step 1 Use the Storage System drop-down to select the storage system.
Step 2 You can create LUN from Cisco DCNM by choosing Storage > LUNs.
a) In the middle pane, click Add LUN.
b) Enter a valid Name for the LUN, and select its Type and Size. The pool which we carve the storage from
is indicated.
Note The Create LUN pop-up window can also be accessed from a Pool’s details page, when the
LUN list view is selected.
c) Click Add.
A confirmation window displays each step. Once confirmed, the status is updated with the results of each
step.
After LUN creation completes successfully, you can Assign Hosts, or click Close and assign Hosts later
from the LUN Details view.
Step 3 Select a LUN in the left navigation pane to view the details.
• The LUN details along with its status and the number of Associated Hosts.
• The Host LUN Mapping details along with the Access (Granted) information.
If the associated fabric has also been discovered, additional information about the switch interfaces and zoning
concerning the end-to-end connection between the Host and LUN is also displayed.
Note All fabrics that are discovered must be licensed or the fabric correlation will be disabled in the Cisco
DCNM. When the feature is disabled, all correlation fields display “Unlicensed Fabric.”
Filer Volumes
Filer Volumes are applicable only for NetApp. The Filer Volume Element view displays the Status, Containing
Aggregate along with the total capacity and used space.
Procedure
Step 1 Use the Storage System drop-down to select the storage system.
Step 2 In the left-hand pane, select the filer to display:
• The status of the filer along with the containing aggregate name.
• Hover the mouse cursor over the graph to view the total capacity and available storage of the filer.
Step 3 You can use the search box to search for a specific Filer.
Hosts
The Hosts only describes the NWWN(s) associated with a host or host enclosure along with the associated
Host LUN Mapping and the Host Ports. If the associated Fabric has also been discovered, additional information
concerning the end-to-end connection between a host and LUN is also displayed.
Procedure
Step 1 Use the Storage System drop-down to select the storage system.
Step 2 In the left-hand pane, select a host to display:
• The NWWN (Node WWN) is the WWN of the device connected to the switch.
• The Host Ports along with the Host LUN Mapping.
• In the Host Ports section, click a Host Enclosure Name to view its Events, Topology and SAN Traffic.
For more information see the Storage section.
• In the Host Ports sections, click a Host Interface to view the Switch Dashboard.
• In the Host LUN Mapping section, click a Storage Interface to view the Switch Dashboard.
• In the Host LUN Mapping section, click a Storage Name to view its Events, Topology and SAN Traffic.
For more information see the Storage section.
If the associated Fabric has also been discovered, additional information about the switch interfaces and zoning
concerning the end-to-end connection between the Host and LUN is also displayed.
Note All fabrics that are discovered must be licensed or the fabric correlation will be disabled in the Web
Client. When the feature is disabled, all correlation fields display “Unlicensed Fabric”.
Step 3 You can use the search box to search for a specific host.
Storage Processors
Storage processors are elements on a storage system, which enable some of its features. A storage processor
includes the collection of storage ports it manages. In the Storage Processor Element View, the list of Storage
Ports that are associated with a Storage Processor is displayed.
Procedure
Step 1 Use the Storage System drop-down to select the storage system.
Step 2 In the left pane, select a storage processor to display:
• The status, adapter details, and the number of ports of the storage processor.
• The storage ports details.
Step 3 You can use the search box to search for a specific storage processor.
Storage Ports
A storage port is a single port on the Storage System. It displays the summary information of each port selected.
Procedure
Step 1 Use the Storage System drop-down to select the storage system.
Step 2 In the left pane, select a storage port to display its details.
Step 3 You can use the search box to search for a specific storage port.
Procedure
Step 1 Choose Dashboard > Storage. Use the drop-down to select All, SAN Storage Enclosures or Storage Systems.
The list of storage enclosures is displayed in a table.
Step 2 Click the Events icon next to the storage enclosure to view the Events panel.
Step 3 You can use the slider control to resize the panel.
Procedure
Step 1 Choose Dashboard > Storage. Use the drop-down to select All, SAN Storage Enclosures, or Storage
Systems.
The list of storage enclosures in a table is displayed.
Step 7 Click the Tabular View icon to view the host topology in tabular format.
Procedure
Step 1 Choose Dashboard > Storage. Use the drop-down to select All, SAN Storage Enclosures or Storage Systems.
The list of storage enclosures is displayed in the table.
SAN Insights
The SAN Insights feature enables you to configure, monitor, and view the flow analytics in fabrics. Cisco
DCNM enables you to visually see health-related indicators in the interface so that you can quickly identify
issues in fabrics. Also, the health indicators enable you to understand the problems in fabrics. The SAN
Insights feature also provides more comprehensive end-to-end flow-based data from host to LUN.
Prerequisites
• The SAN Insights feature is supported for Cisco MDS NX-OS Release 8.3(1) and later.
For information about the SAN Insights dashboard, see SAN Insights Dashboard.
For information about monitoring SAN Insights, see Monitoring Insights Flows.
For information about configuring SAN Insights dashboard, see Configuring SAN Insights.
The Real Time Graph is plotted with corresponding to metrics with from & to date selected. This component
have slider present below the graph as per your selection. It is dynamic in nature as data is refreshed every
30 seconds and can be converted into static graph using the pause button.
This use case consist of multi-select text search feature where you can search for specific text max upto 5
search criteria that can be present in any field (Initiator WWPN, Target WWPN, LUN, Switch IP,
Initiator/Target Enclosure name) and corresponding data will be plotted in both the components.
You can also add multiple graphs for comparison by clicking on the "+" icon at the top right. The data table
will be replaced by multiple Real Time graphs in this view and you can select the corresponding metric to be
plotted by using the multi-select text search feature.
ECT Analysis
There are 4 components in ECT Analysis:
• Data table
• ECT Sequencing by Baseline Deviation
• ECT Baseline Deviation Aggregated
• ITL By Time & Baseline Deviation
The data in all the components are being populated from normalized index present in Elastic Search. Normalized
index is calculated from the raw data provided for different ITL flows. Raw data mainly consists ECT,
Timestamp, I/O, DAL, Throughput, Switch Name, Enclosure ID and Data Length. ECT Baseline & Status
are the metrics that are mainly used to create the above visualization and are calculated using the below logic.
• Baseline for each ITL Flow is calculated using Weighted Average of initial 1 week ECT data (learning
period) using the below logic.
• Initial 1 week data is fetched (ascending order) in an array and divided in 4 sub arrays.
• Outliers are calculated based on whether exchange time is 3 times the mean of initial array (1 week data).
• Outliers are removed from each sub-array and means of each sub arrays are calculated.
• Baseline is calculated by taking weighted average of the sub-array means. 40% weight is given to the
last subarray (recent data), 30 % to the next subarray, 20% and 10% to the last 2 sub arrays.
• Status value is calculated based on where ECT lies compared to ECT Baseline:
Relation Value
Data table
The Data table component has the search functionality for each field in the data table. Data in ECT BASELINE
DEVIATION AGGREGATED tab is segmented based on status and data in ITL BY TIME tab is binned by
time and showed in stacked bar chart based on status. Clicking on pie chart and histogram shows drill down
data showing Initiator, Target and other metric count corresponding to clicked slice of Pie or histogram bar
as shown below. List of Initiator, Target or any metric value can be downloaded in .CSV format by clicking
on the corresponding slice/bar of Pie/histogram.
Click the Trend icon in the data table to navigates to Trend Identifier screen as shown above. There are 2
components showing data corresponding to selected ITL. Trends ITL Metrics shows area chart of ECT, DAL,
IO Size, IOPs and Baseline ECT in the selected time interval (5 minutes selected). Histogram Correlation tab
shows the histogram of count of correlated ITL’s with current ITL binned by correlation value. Clicking on
any bar in this tab converts the histogram into datatable which shows the data corresponding to the selected
bar.
The Outlier Detection page can be viewed by clicking the Outlier Detection icon that appears in the top right
corner of the page. This page consists of 3 tabs that enable you to view the data for longer time interval as
compared to previous pages. This screen takes data from roll up index which is calculated by rolling up each
field’s data of flow index by one hour. ITL Distribution tab shows the scatter plot of metric selected for all
ITL’s present in the selected time interval (1week in this case). This screen can be navigated to trend screen
by clicking any of the dot (corresponds to specific ITL) in the scatter plot. Functionality added 2 tabs namely
ITL’s Below Confidence interval & ITL’s above confidence interval. These 2 tabs are data calculated based
on Average Confidence Interval line.
You can zoom in to view the respective ITL dots at a more granular level by dragging the mouse and selecting
a specific region to be viewed. Clicking on "Reset Zoom" in the zoomed screen will restore default zoom
settings.
This use case consist of Multi-select text search feature where you can search for specific text max upto 2
search criteria that can be present in any field (Initiator/Target Enclosure) and corresponding data will be
plotted in both the components.
Average Confidence Interval shows a band with average line where majority of the metric value lies in the
selected time interval. Remaining 2 tabs shows Box Plot and Pie chart distribution of Top n (5 selected)
Initiator/Target of the selected metric in the selected time interval.
Compute
The compute dashboard provides you with all the information that are related to the discovered SAN and
LAN hosts. It provides detailed information that is related to the network, such as I/O traffic, disk latency,
CPU, memory statistics, topology, and events about each individual host and virtual machines that are
configured on top of the virtual host. The compute dashboard consists of four panels:
• Host Enclosures panel—Lists the hosts and their network attributes.
• Traffic panel—Provides the I/O statistics, CPU and memory information, and disk latency of individual
hosts or virtual machines.
• Topology panel—Provides an end-to-end topology layout and path information between host enclosures
and storage enclosures. The discovered virtual machines are displayed and when you select the virtual
machine, the path to the SAN data source is displayed. You can toggle this view to list all data paths.
• Event panel—Provides information about events of all the switch ports that are configured within a
specific host enclosure.
Field Description
Note • Beginning with Cisco NX-OS Release 6.x, Server Credentials, Servers, and Static Server-Adapter Mapping
are no longer available.
• Beginning from Cisco DCNM Release 10.1, you are able to assign storage to hosts.
• Collection level in the vCenter settings determines the amount of data that is gathered and displayed in
charts. Level 1 is the default Collection Level for all collection intervals. Change the vCenter statistics
settings to Level 2 or higher to collect disk I/O history data.
To view the host enclosures from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 3 To edit the hostname, select the row and click the Rename icon. Enter the new name in the pop-out dialog.
Note Specifying a blank name causes the server to default the name.
Step 4 To assign storage to host, you can select the row and click the Assign icon next to the Rename icon.
The Assign Storage to Host window pops out. The selection of Host is by enclosure, and multiple selections
of LUNs is allowed. Click assign. A confirmation message is displayed. After confirmed, the status will
update with the results of each step.
Step 5 Click Quick Filter drop down to filter host enclosures (not storage) by LAN, SAN, and Virtual.
Procedure
Step 2 Click the Events icon next to the host enclosure to view the Events panel.
You can use the slider control to resize the panel.
Procedure
Step 3
Step 4 Click the Fabric/Network icon to view the fabric and network path.
Step 5 Click the All Paths icon to view the complete set-up.
Step 6 Click the First Shortest Path icon to view the first shortest path.
Note Click Map View icon to enable the icons that are listed in the preceding step 4, 5 and 6.
Step 7 Click the Tabular View icon to view the host topology in tabular format.
Step 8 Click the Custom Port Group icon to view the custom port group.
Procedure
Topology
The topology window shows color encoded nodes and links that correspond to various network elements
including switches, links, fabric extenders, port-channel configurations, virtual port-channel, and more. For
each of the elements, you can hover over to fetch some more information. Additionally, by clicking on the
node for a switch or line for a link, a slide-out panel flies out from the right. This panel shows more detailed
information about either the switch or link. Multiple tabs can be opened simultaneously and are intended to
function side-by-side for comparison and troubleshooting.
Status
The color encoding of each node and link corresponds to its state. The color states are:
• Green—Indicates that the element is in good health and functioning as intended.
• Yellow—Element is in warning state and requires attention to prevent any further problems.
• Red—Element is in critical state and requires immediate attention.
• Gray—Indicates lack of information to properly identify the element or the element has just been
discovered.
Scope
You can search the topology based on the scope. The default scopes available from the SCOPE drop-down
list is: DEFAULT_LAN and DEFAULT_SAN. The search options differ based on the chosen scope.
The following search options are available for DEFAULT_LAN:
• Quick Search
• Tags
• Host name (VDP)
Searching
When the node number is large, it quickly becomes hard to find the intended switches and links. You can
quickly find switches and links by performing a search. You are also able to search for VM tracker and generic
setups. Searching feature enables you to see which leaf the host is connected to.
The following searches are available:
Quick Search
Enables you to search for devices by name, IP address, mode, serial number, and switch role. This search
returns immediately and results are highlighted as the user types.
To perform a search for multiple nodes and links, you can separate multiple keywords by a comma.
For example, a search can look like: ABCD12345, N7K, sw-dc4-12345, core, 172.23.45.67. Wildcards are
also supported.
If you partially know a serial number or name, you can build a search like so: ABCD*, sw*12345, core,
*23.45.*.
If you want to limit your scope to a particular field, you can for example do: name=sw*12345,
serialNumber=ABCD12345.
The following fields are available to search on:Name, ipAddress, serialNumber, model, and switchRole.
Host IP
Search talks to your switches in the scope to find any hosts (VMs or bare metal) that match your given IP
address.
The Host IP search supports both IPv4 and IPv6 addresses.
Host MAC
Search talks to your switches in the scope to find any hosts (VMs or bare-metal) that match your given MAC
address.
VLAN
Search by a given VLAN ID. VLAN search provides the search for the VLAN configured on the switch or
the links. If STP is enabled, then it provides information that is related to the STP protocol and the STP
information for links.
VSAN ID/Name
Search by a given VSAN ID. VSAN search provides the search for VSAN configured on the switch or the
links. In order to view the STP details associated with the VSAN, click STP Details link.
This shows the STP details, if STP is enabled. If the link is blocked, it is marked as red, green in case of a
forwarding link, and orange if the link is blocked for one VSAN range and forwarding for the other VSAN
range.
This search is applicable to both the default LAN and SAN scopes.
Show Panel
You can choose to view your topology based on the following options:
• Auto Refresh—Check the check box to automatically refresh the topology.
• Switch Health—Check the check box to show the switch health status.
• FEX—Check the check box to show the Fabric Extender.
FEX feature is available on LAN devices only. Therefore, checking this check box displays only the
Cisco Nexus Switches that support FEX.
Note If a Cisco Nexus Switch is discovered as part of SAN fabric, FEX feature is not
available. FEX is also not supported on Cisco Nexus 1000V devices. Therefore,
such devices will not be displayed in the topology when you check the FEX check
box.
• Links—Check the check box to show links in the topology. The following options are available:
• Errors Only—Click this radio button to display only links with errors.
• All—Click this radio button to display all links in the topology.
• Bandwidth—Check this check box to show the color coding based on the bandwidth that is consumed
on links.
• OTV—Check the check box to show Overlay Transport Virtualization (OTV) topology with cloud icon
and dotted links from the OTV edge devices. Hovering the mouse over the cloud and links shows the
relevant information for OTV topology such as control group, extended VLANs, and so on. The OTV
search box appears below the filter box which can be used to search the shown OTV topology that is
based on Overlay ID and Extended VLAN ID. Searched virtual links based on the Overlay ID and
Extended VLAN ID are marked green.
A Details link appears after checking the OTV box. Clicking the links shows the OTV topology data.
The Overlay Network column shows whether the particular topology is multicast or unicast based. The
Edge Device column gives the edge switches in the particular OTV topology. Other columns give the
corresponding overlay interface, extended VLANs, join interface and the data group information.
• UI controls—Check the check box to show or hide the various controls on the topology screen.
• Compute—Check the check box to enable the compute visibility on the topology screen.
• Refresh—You can also perform a topology refresh by clicking the refresh icon in the upper right of this
panel.
Layouts
The topology supports various different layouts and a Save Layout option which remembers how you positioned
your topology.
• Hierarchical/Hierarchical Left-Right—Provides an architectural view of your topology. Various Switch
Roles can be defined that will draw the nodes on how you configure your CLOS topology.
Note When running a large scale setup, being able to easily view all your switches on
a leaf-tier can become difficult. To mitigate this, DCNM splits your leaf-tier every
16 switches.
• Random—Nodes are placed randomly on the screen. DCNM tries to make a guess and intelligently
place nodes that belong together in close-proximity.
• Circular/Tiered-Circular—Draws nodes in a circular or concentric circular pattern.
• Custom saved layout—You can drag nodes around to your liking. Once you have the positions as how
you like, you can click the save button to remember the positions. Next time you come to the topology,
DCNM will draw the nodes based on your last saved layout positions.
Before a layout is chosen, DCNM checks if a custom layout is applied. If a custom layout is applied, DCNM
uses it. If a custom layout is not applied, DCNM checks if switches exist at different tiers, and chooses
Hierarchical layout or Hierarchical Left-Right layout. Force-directed layout is chosen if all other layouts fail.
Beacon
This button will only by shown for switches that support the beacon command. Once the beaconing starts,
the button will show a countdown. By default, the beaconing will stop after 60 seconds but you can stop it
immediately by clicking stop beacon.
Note The default time can be configured in server.properties. Search for beacon.turnOff.time. The time value here
is in milliseconds. Note that this requires a server restart to take effect.
Tagging
Tagging is a powerful yet easy way to organize your switches. Tags can be virtually any string and an example
of tags includes: building 6, floor 2, rack 7, problem switch, and Justin debugging.
You can use the search to perform searches based on tags.
More Details
Click Show more details and the detailed information appears in the Switch Dashboard.
24 Hour Traffic
This features requires Performance Monitoring be turned ON. When Performance Monitoring is ON,
traffic information is collected and aggregative information is displayed along with a graph showing the traffic
utilization.
Note You can use the Print icon to print the information that is displayed or you can also use the Export icon to
export the information that is displayed to a Microsoft Excel spreadsheet. You can also choose the column
that you want to display.
Procedure
Step 3 In the Health column, the switch health is calculated by the capacity manager based on the following formula
in the server.properties file.
The function to implement is:
# calculate(x, x1, y, y1, z).
# @param x: Total number of modules.
# @param x1: Total number of modules in warning.
# @param y: Total number of switch ports.
# @param y1: Total number of switch ports in warning.
# @param z: Total number of events with severity of warning or above.
Step 4 The value in the Health column is calculated based on the following default equation.
((x-x1)*1.0/x) *0.4 + ((y-y1)*1.0/y)*0.3 + ((z*1.0/1000>=1) ? 0: ((1000-z)*1.0/1000)*0.3).
In the above formula, the switch health value is calculated based on the following:
• Percentage of Warning Modules (Contributes 40% of the total health).
• Percentage of Warning Ports (Contributes 30% of the total health).
• Percentage of events with severity of Warning or above (Contributes 30% of the total health. If there are
more than 1000 warning events, the event health value is 0).
You may also have your own health calculation formula by implementing the common interface class:
com.cisco.dcbu.sm.common.rif.HealthCalculatorRif. Add the .jar file to the DCNM server and modify the
health.calculator property to point to the class name you have created.
The default Java class is defined as: health.calculator=com.cisco.dcbu.sm.common.util.HealthCalculator.
• Capacity Manager calculates health only for the license switches. If the health column does not display
a value, the switch either does not have a license or it has missed the capacity manager daily cycle.
• If the switch is unlicensed, click Unlicensed in the DCNM License column. The Administration >
License window appears which allows you to assign a license to the user.
• The capacity manager runs two hours after the DCNM server starts. So, if you discover a device after
two hours of the DCNM start time, the health will be calculated 24 hours after this DCNM start time
Procedure
Step 1 From the Cisco DCNM home page, choose Inventory > View > Switches.
An inventory of all the switches that are discovered by Cisco Prime DCNM Web Client is displayed.
Step 3 Click the System Information tab. This tab displays detailed system information such as group name, health,
module, time when system is up, serial number, the version number, contact, location, DCNM license, status,
system log sending status, CPU and memory utilization, and VTEP IP address are displayed. Click Health
to access the Health score screen, which includes health score calculation and health trend. The popup contains
Overview, Modules, Switch Ports, and Events tabs.
• (Optional) Click SSH to access the switch through Secure Shell (SSH).
• (Optional) Click Device Manager to view a graphical representation of a Cisco MDS 9000 Family switch
chassis, a Cisco Nexus 5000 Series switch chassis, a Cisco Nexus 7000 Series switch chassis, or a Cisco
Nexus 9000 Series switch chassis including the installed switching modules, the supervisor modules, the
status of each port within each module, the power supplies, and the fan assemblies.
• (Optional) Click HTTP to access the switch through Hypertext Transfer Protocol (HTTP) for that switch.
• (Optional) Click Accounting to go to the Viewing Accounting Information , on page 68 window pertaining
to this switch.
• (Optional) Click Backup to go to the Viewing a Configuration window.
• (Optional) Click Events to go to the Viewing Events Registration, on page 217 window.
• (Optional) Click Show Commands to display the device show commands. The Device Show Commands
page helps you to view commands and execute them.
• (Optional) Click Copy Running Config to Startup Config to copy the running configuration to the
startup configuration.
Note After you install Cisco DCNM for Windows, you must edit and provide credentials in the Cisco DCNM SAN
Services to Log on. Navigate to Services > Cisco DCNM SAN Server > Cisco DCNM SAN Server Properties
> Log On tab. Select This account radio button, and provide username and password. Click Ok. Log on to
SSH and stop DCNM services. After you start the DCNM services, you must be able to use Device Manager.
Note After you install Cisco DCNM for Linux, perform the procedure that is provided on the screen for Device
Manager to be functional. Device Manager requires graphical environment that is configured properly in the
Linux/OVA DCNM server.
Procedure
Step 1 From the left menu bar, choose Inventory > View > Switches.
An inventory of switches discovered by Cisco Prime DCNM Web Client is displayed.
Step 3 Click the Device Manager tab. The Device Manager login dialog box appears. Log into the Device Manager
application. The Device Manager provides a graphic representation of the installed switching modules, the
supervisor modules, the status of each port within each module, the power supplies, and the fan assemblies.
For more information about the Device Manager, go to the following URL:
Cisco DCNM SAN Client Online Help
Interfaces
The Interfaces option displays all the interfaces that are discovered for the switch, Virtual Port Channels
(vPCs), and intended interfaces missing on the device.
You can filter and view information for any of the given fields (such as Device Name). The following table
describes the buttons that appear on this page. The following table describes the buttons that appear on this
page.
Field Description
Field Description
Procedure
Rediscovering Interfaces
Procedure
Procedure
Step 4 Click Interface History to display the interface history details such as Policy Name, Time of Execution,
and so on.
VLAN
You create a VLAN by assigning a number to it; you can delete VLANs and move them from the active
operational state to the suspended operational state.
To configure VLANs, choose Inventory > View > Switches, and then click a switch in the Device Name
column.
The following table describes the buttons that appear on this page.
Field Description
Clear Selections Allows you to unselect all the VLANs that you
selected.
Adding a VLAN
Procedure
Step 2 In the Device Name column, select a switch to display the Switch Dashboard.
Step 3 Click the VLAN tab.
Step 4 Click Add to create Classical Ethernet or Fabric Path VLANs. In the Add VLAN window, specify the
following fields:
a) In the Vlan Id field, enter the VLAN ID.
b) In the Mode field, specify whether you are adding Classical Ethernet or Fabric Path VLAN.
c) Select the Admin State ON check box to specify whether the VLAN is shutdown or not.
Editing a VLAN
Procedure
Step 2 In the Device Name column, select a switch to display the Switch Dashboard.
Step 3 Select one or more VLANs, and then click the Edit button.
Deleting a VLAN
Procedure
Step 2 In the Device Name column, select a switch to display the Switch Dashboard.
Step 3 Click VLAN tab.
Step 4 Select the VLAN that you want to delete, and then click Delete.
Procedure
Step 2 In the Device Name column, select a switch to display Switch Dashboard.
Step 3 Click the VLAN tab.
Step 4 Click Shutdown to disable a VLAN. For example, if you want to stop traffic on a you can shut the VLAN.
To enable a VLAN, click No Shutdown button. For example, if you want to start traffic flow on a VLAN
you can enable it.
Procedure
Step 2 In the Device Name column, select a switch to display Switch Dashboard.
Step 3 Click the VLAN tab.
Step 4 Click Show to display the VLAN show commands. Based on the VLAN selection, you can show the VLAN
commands. Interface Show Commands window helps you to view commands and execute them.
FEX
The Fabric Extender feature allows you to manage a Cisco Nexus 2000 Series Fabric Extender and its
association with the Cisco NX-OS switch that it is attached to. A Fabric Extender is connected to the switch
through physical Ethernet interfaces or a Port Channel. By default, the switch does not allow the attached
Fabric Extender to connect until it has been assigned a chassis ID and is associated with the connected interface.
You can configure a Fabric Extender host interface port as a routed or Layer 3 port. However, no routing
protocols can be tied to this routed interface.
Note FEX feature is available on LAN devices only. Therefore, you will see FEX on Cisco DCNM Inventory
Switches. If a Cisco Nexus Switch is discovered as part of SAN fabric, FEX feature is not available. FEX is
also not supported on Cisco Nexus 1000V devices.
Note 4x10G breakout for FEX connectivity is not supported on Cisco Nexus 9500 Switches.
Note The Fabric Extender may connect to the switch through several separate physical Ethernet interfaces or at
most one port channel interface.
This section describes how to manage Fabric Extender (FEX) on Cisco Nexus Switches through Cisco DCNM.
You can create and manage FEX from Cisco DCNM Inventory > Switches.
The following table describes the fields that appear on this page.
Field Description
Edit Select any active FEX radio button and click Edit to edit the FEX
configuration.
You can create an edit template and use it for editing FEX. Select template
type as POLICY and sub type as FEX.
Delete Select the FEX radio button, and click Delete icon to delete the FEX
associated with the switch.
Show Allows you to view various configuration details for the selected FEX
ID. You can select the following from the drop-down list.
• show_diagnostic
• show_fex
• show_fex_detail
• show_fex_fabric
• show_fex_inventory
• show_fex_module
FEX History Allows you to view the history of the FEX configuration tasks for a
particular FEX. You can review the Event Type, Policy Name, Status,
Time of Execution, User Name for the selected FEX.
Field Description
Fex Version Specifies the version of the FEX that is associated with the switch.
Pinning An integer value that denotes the maximum pinning uplinks of the Fabric
Extender that is active at a time.
State Specifies the status of the FEX as associated with the Cisco Nexus Switch.
Field Description
Port Channel Specifies the port channel number to which the FEX is physically
connected to the Switch.
Add FEX
To add single-home FEX from the Cisco DCNM Web UI, perform the following steps:
Note You can create only single homed FEX through Inventory > Switches > FEX > Add FEX. To create a
dual-homed FEX, use the vPC wizard through Configure > Deploy > vPC.
Ensure that you have successfully discovered LAN devices and configured LAN credentials before you
configure FEX.
Procedure
Step 5 In the FEX_ID field, enter the ID for FEX that is connected to a Cisco NX-OS device.
Edit FEX
To edit and deploy FEX from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 2 Select the FEX radio button that you must edit. Click Edit FEX icon.
Step 3 In the Edit Configuration window, from the Policy drop-down list, select Edit_FEX to edit the FEX
configuration.
Step 4 Edit the pinning and FEX_DESC fields, as required.
Note If you initially configured port 33 on the parent switch as your only fabric interface, all 48 host
interfaces are pinned to this port. If you provision another port, for example 35, then you must
perform this procedure to redistribute the host interfaces. All host interfaces are brought down and
host interfaces 1 to 24 are pinned to fabric interface 33 and host interfaces 25 to 48 are pinned to
fabric interface 35.
Step 6 After you review the configuration summary on the Preview window, on the Edit Configuration screen, click
Deploy to deploy the FEX for the switch.
VDCs
This section describes how to manage Virtual Device Contexts (VDCs) on Cisco Nexus 7000 Switches through
Cisco DCNM.
Users with the network administrator (network-admin) role can create Virtual Device Contexts (VDCs). VDC
resource templates limit the amount of physical device resources available to the VDC. The Cisco NX-OS
software provides a default resource template, or you can create resource templates.
You can create and manage VDCs from Cisco DCNM Inventory > Switches > VDCs. As Cisco DCNM
supports DCNM on Cisco Nexus 7000 Series only, click an active Cisco Nexus 7000 Switch. After you create
a VDC, you can change the interface allocation, VDC resource limits, and the high availability (HA) policies.
The following table describes the fields that appear on this page.
Field Description
Edit Select any active VDC radio button and click Edit to
edit the VDC configuration.
Resume Allows you to delete the VDC. Select any active VDC
radio button and click Delete to remove the VDC
associated with the device.
Field Description
Type Species the type of VDC. The two types of VDCs are:
• Ethernet
• Storage
Field Description
Resource Limit-Module Type Displays the allocated resource limit and module type.
Add VDCs
To add VDC from the Cisco DCNM Web UI, perform the following steps:
Procedure
Procedure
Step 1 In the General Parameter tab, specify the VDC Name, Single supervisor HA-policy, Dual supervisor
HA-policy, and Resource Limit - Module Type.
Step 2 In the Allocate Interface tab, select the network interfaces (dedicated interfaces membership) to be allocated
to the VDC.
Click Next.
Step 3 In the Allocate Resource tab, specify the resource limits for the VDC.
Select the radio button and choose Select a Template from existing Templates or Create a New Resource
Template. VDC resource templates describe the minimum and maximum resources that the VDC can use. If
you do not specify a VDC resource template when you create a VDC, the Cisco NX-OS software uses the
default template, vdc-default.
• If you choose Select a Template from existing Templates, from the Template Name drop-down list, you
can select None, global-default, or vdc-default.
The template resource limits are detailed in the following below:
Anycast Bundled
Port Channels
SPAN Sessions
VLAN
Anycast Bundled
VRF
• If you choose Create New Resource Template, enter a unique Template Name. In the Resource Limits
area, enter the minimum and maximum limits, as required for the resources.
You can edit individual resource limits for a single VDC through the Cisco DCNM Web Client > Inventory
> Switches > VDC.
Click Next.
Step 4 In the Authenticate tab, you can allow the Admin to configure the password and also authenticate users using
AAA Server Groups.
In the Admin User Area:
• Check the Enable Password Strength Check checkbox, if necessary.
• In the Password field, enter the admin user password.
• In the Confirm Password field, reenter the admin user password.
• In the Expiry Date field, click the down arrow and choose an expiry date for the admin user from the
Expiry Date dialog box. You can also select Never radio button not to expire the password.
Click Next.
Step 7 In the Deploy tab, the status of the VDC deployment is displayed.
A confirmation message appears. Click Know More to view the commands that are executed to deploy the
VDC.
Click Finish to close the VDC configuration wizard and revert to view the list of VDCs configured on the
device.
You can configure shared interfaces that carry both Ethernet and Fibre Channel traffic. In this specific case,
the same interface belongs to more than one VDC. The shared interface is allocated to both an Ethernet and
a storage VDC.
Procedure
Step 1 In the General Parameter tab, specify the VDC Name, Single supervisor HA-policy, Dual supervisor
HA-policy, and Resource Limit - Module Type.
Step 2 In the Allocate FCoE Vlan tab, select the available Ethernet Vdc from the drop-down list.
The existing Ethernet VLANs range is displayed. Select None not to choose any available Ethernet VDCs.
You can allocate specified FCoE VLANs to the storage VDC and specified interfaces.
Click Next.
Step 3 In the Allocate Interface tab, add the dedicated and shared interfaces to the FCoE VDC.
Note The dedicated interface carries only FCoE traffic and the shared interface carries both the Ethernet
and the FCoE traffic.
You can configure shared interfaces that carry both Ethernet and Fibre Channel traffic. In this specific case,
the same interface belongs to more than one VDC. FCoE VLAN and shared interface can be allocated from
same Ethernet VDC.
Click Next.
Step 4 In the Authenticate tab, you can allow the Admin to configure the password and also authenticate users using
AAA Server Groups.
In the Admin User Area:
• Check the Enable Password Strength Check checkbox, if necessary.
• In the Password field, enter the admin user password.
• In the Confirm Password field, reenter the admin user password.
• In the Expiry Date field, click the down arrow and choose an expiry date for the admin user from the
Expiry Date dialog box. You can also select Never radio button not to expire the password.
Click Next.
Step 7 In the Deploy tab, the status of the VDC deployment is displayed.
A confirmation message appears. Click Know More to view the commands that are executed to deploy the
VDC.
Click Finish to close the VDC configuration wizard and revert to view the list of VDCs configured on the
device.
Edit VDC
To edit VDC from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 2 Select the VDC radio button that you must edit. Click the Edit VDC icon.
Step 3 Modify the parameters as required.
Step 4 After you review the configuration summary on the Summary tab, click Deploy the VDC with the new
configuration.
The following metrics are supported by the Switch On-Board Analytics charts:
• Read and Write Completion Time—Time that is taken for an IO to complete successfully, that is, the
time gap between IO status from a Target and IO command from an Initiator. The following metrics are
supported:
The IO engine tracks the maximum and minimum IO completion time for read and write commands in
the context of a switch’s port, target port, flows, initiators, and LUNs.
• Read and Write Initiation Time—Time that is taken for an IO to initiate, that is, the time gap between
the first response packet from a Target and IO Command from Initiator. The following metrics are
supported:
• Read Initiation Time Min
• Read Initiation Time Max
• Write Initiation Time Min
• Write Initiation Time Max
The IO engine tracks the maximum and minimum IO initiation time for read and write commands in the
context of a switch’s port, target port, flows, initiators, and LUNs.
• Read and Write IO Bandwidth—Read and write command bandwidth observed in the context of a switch's
port traffic, target port traffic, flow traffic, initiators, and LUNs. The IO bandwidth is computed at every
four second time interval based on the number of bytes read or written.
• Read and Write IO Rate—Read and write command IO rate observed in the context of a switch's port
traffic, target port traffic, flow traffic, initiators, and LUNs. The IO rate is computed at every four second
time interval that is based on the number of IO performed.
• Read and Write IO Size—Read and write command IO size observed in the context of a switch's port
traffic, target port traffic, flow traffic, initiators, and LUNs. The following metrics are supported:
• Read IO Size Min
• Read IO Size Max
• Write IO Size Min
• Write IO Size Max
The IO engine tracks the maximum and minimum IO size for read and write commands.
Procedure
Note The Show Time drop-down list is applicable only for the top ten slowest ports,
target ports, flows, and ITLs.
• From the Show Flow From drop-down list, choose whether to show flows from a Target or from an
Initiator. By default, flows from a Target are chosen.
Note The Show Flow From drop-down list is applicable only for the charts displaying
flows and ITLs.
• From the bandwidth and size drop-down list, choose the traffic information to be shown in the charts.
You can choose one of the following options:
• Bytes
• KB
• MB
Note Filtering results by VSAN is not applicable for the Top 10 Slowest Ports or Top
10 Port Traffic charts.
• Check the Single Column check box to display the charts in a single column instead of double columns.
• Click the Refresh icon in the upper-right corner to refresh the charts.
Note • By default, Read Completion Time is selected and all the units for time
are in Microseconds.
• Each chart contains a legend that provides information about the variable
displayed. Each variable has a check box. Unselecting the check box removes
the variable data from the chart or table.
• View the charts for the top ten port traffic, target port traffic, flow traffic, and ITL traffic by choosing
one of the following variables from the drop-down list:
• Read IO Rate—The read command data observed in the context of a switch’s port.
• Write IO Rate—The write command observed in the context of a switch’s port.
• Read IO Size—The read command size observed in the context of a switch’s port.
• Write IO Size—The write command size observed in the context of a switch’s port.
• Read IO Bandwidth—The read command bandwidth observed in the context of a switch’s port.
• Write IO Bandwidth—The write command bandwidth observed in the context of a switch’s port.
Note • By default, Read IO Rate is selected. The Read IO Rate is IO per second.
Both Rate and Bandwidth units are per second over an 8-second range.
The Size value is for the life of the switch or since the last clear command
was run from the CLI.
• The Read IO Size and Read IO Bandwidth units are in bytes per second.
You can change this unit by using the Show Bandwidth and Size drop-down
list. You can choose from the three options: Bytes, KB, and MB.
• Each chart contains a legend that provides information about the variable
displayed. Each variable has a check box. Unselecting the check box removes
the variable data from the chart or table.
• Choose the format to display information from the Show drop-down list. You can choose one of the
following formats:
• Chart
• Table
• Chart and Table
Note • To display information in the Chart and Table format, enlarge your browser
window or check the Single Column check box on the upper right corner.
• The default for Top ten Slowest Ports and Top 10 Port Traffic is Chart and
Table.
• Use the Chart Type drop-down list to display information in the Bar Chart or Stacked Bar Chart.
• Use the Actions drop-down list to export information in a CSV or PDF, or print the required information.
• To view a chart or a table in a new window, click the Detach icon on the upper-right corner of a chart
or a table. After detaching a chart or table, you can view the top 25 slowest ports, target ports, flows,
ITLs, or their traffic.
Procedure
Procedure
Discovery
Starting from Cisco DCNM release 10.x, Cisco DCNM Web Client allows the admin to associate user to
one or more device scope or group. That means you can only access and configure the associated group or
scope devices based on Role Based Access Control (RBAC). Though you might not have the access to other
users' associated devices, you can still see all the discovered devices under the Inventory > Discovery tab.
From the left menu bar, go to Administration > Management Users. You can create users and associate
groups, manage remote authentication, and see all the connected clients. For more information about RBAC,
navigate to Managing Local Users.
Adding, Editing, Re-Discovering, Purging and Removing LAN, LAN Tasks and
Switch
Cisco DCNM Web Client reports information that is obtained by the Cisco DCNM-LAN devices.
Tip If the discovered Device is not in the scope of the current user the check box for the LAN Device in the LAN
table grays out.
Procedure
Step 3 Select Hops from seed Switch or Switch List. The fields vary depending on your selection.
Step 4 Enter the Seed Switch IP address for the fabric.
For LAN Switches Discovery, DCNM allow both IPv4 and IPv6 address for the Seed Switch.
Step 5 The options vary depending on the discovery type selected. For example, if you check Use SNMPv3/SSH,
varied fields are displayed.
Step 6 Click the drop-down menu and choose the Auth-Privacy security level.
Step 7 Enter the Community, or user credentials.
Step 8 Select the LAN group from the LAN groups candidates which is in the scope of the current user.
Note Select DCNM server and click Add to add LAN switches.
Step 11 Select a switch and click Add to add a switch to the switch group.
If the seed switch(es) are not reachable, it will be shown as “unknown” on the shallow Discovery window.
Procedure
Step 1 From the menu bar, choose Inventory > Discovery > LAN Switches.
Step 2 Select the check box next to the LAN that you want to edit and click Edit icon.
You see the Edit LAN dialog box.
Procedure
Procedure
Procedure
Adding a Fabric
To discover new fabric and start managing a fabric from the Cisco DCNM Web UI, perform the following
steps:
Procedure
Step 3 Enter the Fabric Seed Switch IP address or DNS name for this fabric.
Step 4 (Optional) Check the SNMP check box to use SNMPv3 or SSH. If you check the SNMP check box, the field
Community changes to Username and Password.
Step 5 Enter the Username and Password for this fabric.
Step 6 Select the privacy settings from the Auth-Privacy drop-down list.
Step 7 (Optional) Check the Limit Discovery by VSAN checkbox to specify the included VSAN list or excluded
VSAN list from the VSANs provided to discover a new fabric.
Step 8 (Optional) Check the Enable NPV Discovery in all Fabrics check box. If you check enable NPV discovery
in all fabrics, the changes are applied to all the fabrics that are previously discovered.
Step 9 Click Options and specify the UCS Username and UCS Password.
Step 10 Click Add to begin managing this fabric.
You can remove single or multiple fabrics from the Cisco DCNM Web Client.
Deleting a Fabric
Procedure
Editing a Fabric
Procedure
Step 1 From the menu bar, choose Inventory > Discovery > SAN Switches.
Step 2 Select the check box next to the fabric that you want to edit and click on the Edit icon.
You see the Edit Fabric dialog box. You can edit only one fabric at a time.
Procedure
Rediscovering a Fabric
Procedure
Purging a Fabric
You can clean and update the fabric discovery table through the Purge option.
Procedure
Procedure
Procedure
Step 1 From the menu bar, choose Inventory > Discovery > Storage Devices.
Step 2 Use the check-box to select the SMI-S provider and click the Delete icon.
The provider is removed and all data associated with the provider is purged from the system.
Procedure
Step 1 From the menu bar, choose Inventory > Discovery > Storage Devices.
Step 2 Use the check-box to select the SMI-S provider and click the Edit SMI-S provider icon.
Step 3 In the Edit SMI-S Provider window, use the drop-down to select the Vendor.
Step 4 Specify the SMI-S Sever IP, User Name and Password.
Step 5 Specify the Name Space and Interop Name Space.
Step 6 By default, the Port number is pre-populated.
If you select the Secure checkbox, then the default secure port number is populated.
Procedure
Procedure
Procedure
Step 3 Enter the Virtual Center Server IP address for this VMware server.
Step 4 Enter the User Name and Password for this VMware server.
Step 5 Click Add to begin managing this VMware server.
Procedure
Procedure
Procedure
Monitoring Switch
The Switch menu includes the following submenus:
Procedure
Step 2 You can use the drop-down to filter the view by Last 10 Minutes, Last Hour, Last Day, Last Week, Last
Month, and Last Year.
Step 3 In the Switch column, click the switch name to view the Switch Dashboard.
Step 4 Click the chart icon in the Switch column to view the CPU utilization.
You can also change the chart timeline to Last 10 Minutes, Last Hour, Last Day, Last Week, Last Month, and
Last Year. You can choose the chart type and chart options to show as well.
Procedure
Step 2 Use the drop-down to filter the view by Last 10 Minutes, Last Hour, Last Day, Last Week, Last Month, and
Last Year.
Step 3 Click the chart icon in the Switch column to see a graph of the memory usage of the switch.
Step 4 In the Switch column, click the switch name to view the Switch Dashboard.
Step 5 You can use the drop-down to view the chart in different time lines. Use the chart icons to view the memory
utilization chart in varied views.
Procedure
Step 2 Use the drop-down to filter the view by 24 hours, Week, Month, and Year.
Step 3 Click the Export icon in the upper-right corner to export the data into a spreadsheet.
Step 4 Click Save.
Step 5 Click the switch name to view the Switch Dashboard section.
Note It is not necessary to configure the LAN or SAN credentials under the Configure > Credentials Management
> LAN Credentials screen to fetch the temperature monitoring data from the switches.
To view the switch temperature information from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 2 From this list, each row has a chart icon, which you can click.
A chart is displayed, which shows historical data for the sensor. The interval for this chart can be changed as
well, between 24 hours, 1 week, and 1 month.
Procedure
Step 2 You can use the drop-down to filter the view by 24 hours, Week, Month, and Year.
There are variations to this procedure. In addition to these basic steps, you can also do the following:
• Select the time range, and click Filter to filter the display.
• Click the chart icon in the Switch column to see a graph of the performance for this user-defined object.
You can change the time range for this graph by selecting it from the drop-down list in the upper right
corner.
• Use the chart icons to view the traffic chart in varied views.
Procedure
Step 2 You can use the drop-down to filter the view by 24 hours, Week, Month, and Year.
Step 3 Click the Export icon in the upper-right corner to export the data into a spreadsheet.
Step 4 Click Save.
Step 5 Click the switch name to view the Switch Dashboard.
Procedure
Step 2 Select Advanced Filter beside the filter icon to search the accounting information by Source, Username,Time,
and Description. Or select Quick Filter to search under each column.
Step 3 You can also select a row and click the Delete icon to delete accounting information from the list.
Step 4 You can use the Print icon to print the accounting details and use the Export icon to export the data to a
Microsoft Excel spreadsheet.
Procedure
Step 2 Select an event in the table and click the Add Suppressor icon to open the shortcut of adding an event
suppressor rule.
Step 3 Select one or more events from the table and click the Acknowledge icon to acknowledge the event information
for the fabric.
• After you acknowledge the event for a fabric, the acknowledge icon is displayed in the Ack column next
to the fabric.
Step 4 Select the fabric and click the Unacknowledge icon to cancel an acknowledgment for a fabric.
Step 5 Select Advanced Filter beside the filter icon to search the accounting information by Source, Username,Time,
and Description. Or select Quick Filter to search under each column.
Step 6 Select a fabric and use the Delete icon to delete the fabric and event information from the list.
Step 7 Click the Print icon to print the event details.
Step 8 Click the Export to Excel icon to export the data.
Monitoring SAN
The SAN menu includes the following submenus:
Procedure
Step 2 You can use the drop-down to filter the view by 24 hours, Week, Month, and Year.
Note NaN (Not a Number) in the data grid means that the data is not available.
Note It is empty for non-FCIP ports under the FCIP Compression Ratio column.
There are variations to this procedure. In addition to these basic steps, you can perform the following steps
to view detailed information for ISLs:
• To change the time range for this graph, select it from the drop-down list in the upper-right corner.
• To view the detailed information for a specific period, drag the slider control to choose the time interval
for which you need the information.
• Use the chart icons to view the traffic chart in varied views. You can also use the icons to Append,
Predict, and Interpolate Data. To view real-time information, choose Refresh icon from in the upper
right corner. The real-time data is updated in every 10 seconds.
• To export the data into a spreadsheet, click the Export icon in the upper-right corner and click Save.
• For the Rx/Tx calculation, see the following Rx/Tx calculation formula.
Note The conversion for Fabrics is 10 bit = 1 byte and for LAN traffic, the conversion is 8 bit = 1
byte.
• Average Rx/Tx % = Average Rx/Tx divided by Speed * 100
• Peak Rx/Tx % = Peak Rx/Tx divided by Speed * 100
If the performance tables do not contain any data, see the Performance Setup Thresholds section to turn on
performance.
Procedure
Step 2 You can use the drop-down to filter the view by 24 hours, Week, Month, and Year.
Step 3 Click the chart icon in the Name column to see a list of the traffic for the past 24 hours.
There are variations to this procedure. In addition to these basic steps, you can also perform the following
steps to view detailed information for NPV links:
• You can change the time range for this information by selecting from the drop-down list in the upper-right
corner.
• To view the detailed information for a specific period, drag the slider control to choose the time interval
for which you need the information.
• Use the chart icons to view the traffic chart in varied views. You can also use the icons to Append,
Predict, and Interpolate Data.
• To export the data into a spreadsheet, click the Export icon in the upper-right corner and click Save.
• To view real-time information, choose Real Time from the drop-down list in the Chart menu.
Note If the performance tables do not contain any data, see the Performance Setup Thresholds, on page
216 section to turn on performance data collection.
Procedure
Procedure
Step 2 You can use the drop-down to filter the view by 24 hours, Week, Month, and Year.
There are variations to this procedure. In addition to these basic steps, you can also perform the following
steps:
• Choose an Ethernet port in the Name column to see a graph of the traffic across that Ethernet port for
the past 24 hours. You can change the time range for this graph by selecting it from the drop-down list
in the upper-right corner.
• To export the data into a spreadsheet, click the Export icon in the upper-right corner and then Save.
• Use the chart icons to view the traffic chart in varied views. You can also use the icons to Append,
Predict, and Interpolate Data.
• For the Rx/Tx calculation, see the following Rx/Tx calculation formula.
Note The conversion for Fabrics is 10 bit = 1 byte and for LAN traffic, the conversion is 8 bit = 1
byte.
• Average Rx/Tx % = Average Rx/Tx divided by Speed * 100
• Peak Rx/Tx % = Peak Rx/Tx divided by Speed * 100
Note If the performance tables do not contain any data, see the Performance Setup Thresholds, on page
216 section to turn on performance data collection.
Procedure
Step 2 Use the drop-down to view All or Warning information for the FC End devices on host ports.
Step 3 Click the Show Filter icon to enable filtering by Enclosure, Device Name, or VSAN.
Procedure
Step 2 You can choose to display All ports, Host ports, or Storage ports from the drop-down list on the upper right
corner.
Step 3 You can use the drop-down to filter the view by 24 hours, Week, Month, and Year.
Step 4 To export the data into a spreadsheet, click the Export icon in the upper-right corner and click Save.
Step 5 Click the chart icon in the Name column to see the following:
• A graph of the traffic on that device according to the selected timeline.
• Use the chart icons to view the traffic chart in varied views. To view real-time information, click the
refresh icon from the drop-down list in the upper right corner. The real-time data is updated in every 10
seconds. You can also use the icons to Append, Predict, and Interpolate Data.
Note If the performance tables do not contain any data, see the Performance Setup Thresholds, on page
216 section to turn on performance data collection.
Procedure
Step 2 You can use the drop-down to filter the view by 24 hours, Week, Month, and Year.
Step 3 To export the data into a spreadsheet, click the Export icon in the upper-right corner and then click Save.
Step 4 Click the chart icon in the Name column to see:
• A graph of the traffic on that device according to the selected timeline.
• Use the chart icons to view the traffic chart in varied views. To view real-time information, click the
Refresh icon from the drop-down list in the upper right corner.
• You can also use the icons to Append, Predict, and Interpolate Data.
Note If the performance tables do not contain any data, see the Performance Setup Thresholds, on page
216 section to turn on performance data collection.
Procedure
Step 2 You can select to view Host Enclosures or Storage Enclosures from the drop-down list on the upper right
corner.
Step 3 You can use the drop-down to filter the view by 24 hours, Week, Month, and Year.
Step 4 To export the data into a spreadsheet, click the Export icon in the upper-right corner and then click Save.
Step 5 Click the chart icon in the Name column to see:
• A graph of the traffic on that device according to the selected timeline.
• Use the chart icons to view the traffic chart in varied views.
• You can also use the icons to Append, Predict, and Interpolate Data.
Note If the performance tables do not contain any data, see the Performance Setup Thresholds, on page
216 section to turn on performance data collection.
Procedure
Step 2 You can use the drop-down to filter the view by 24 hours, Week, Month, and Year.
Step 3 Click the name port group to see the members of that port group.
There are variations to this procedure. In addition to these basic steps, you can also perform the following
steps to view detailed information for the port groups:
• To change the time range for this graph, select it from the drop-down list in the upper right corner.
• To view the detailed information for a specific period, drag the slider control to choose the time interval
for which you need the information.
• Use the chart icons to view the traffic chart in varied views.
• You can also use the icons to Append, Predict, and Interpolate Data.
• To export the data into a spreadsheet, click the Export icon in the upper-right corner and click Save.
Note If the performance tables do not contain any data, see the Performance Setup Thresholds, on page
216 section to turn on performance data collection.
Note All fabrics that are discovered must be licensed or this feature will be disabled in the Cisco DCNM Web
Client. When the feature is disabled, a notification is displayed stating unlicensed fabrics are discovered.
From the menu bar, choose Monitor > SAN > Host Path Redundancy.
Tests to Run
Procedure
Results
Procedure
Step 1 Choose Monitor > SAN > Host Path Redundancy tab.
Step 2 The bottom Results area has four tabs that are Host Path Errors, Ignored Hosts, Ignored Storage, and
Ignored Host Storage Pairs.
Step 3 Click Host Path Errors tab to display the host path redundancy errors table. On the top of the table, the
colored Good, Skipped, and Errored host enclosure counts, along with the last update time are displayed.
a) The Host Enclosure column displays the hosts that contain the errors. These are counts of each path in
the host enclosures seeing an error. The Storage Enclosure/Storage Port column displays the connected
storage that is involved the errors. In the Fix? column, hover the mouse cursor on the ? icon to view a
solution to fix the error.
b) Select a row and click Ignore Hosts to add the selected rows host enclosure to an exclusion list. The
errors from that host will no longer be reported and the current errors will be purged from the database.
c) Select a row and click Ignore Storage to add the selected rows storage enclosure to an exclusion list.
d) Select a row and click Ignore Host Storage Pair to add the selected rows host-storage pair enclosure to
an exclusion list.
e) In the drop-down list next to Show on the upper right corner of the table, select Quick Filter. Enter the
keywords in the column headers of the table to filter the items. Select All to display all the items.
f) Click the circulation icon on the upper right corner of the table to refresh the table.
g) Click the Print icon on the upper right corner of the table to print the errors as tables.
h) Click the Export icon on the upper right corner of the table to export the table to a Microsoft excel
spreadsheet.
Step 4 Click the Ignored Hosts tab to display the list of host enclosures that have been skipped or ignored by the
redundancy check along with the reason the reason for skipping. The following reasons may be displayed:
• Skipped: Enclosure has only one HBA.
• Host was ignored by the user.
• Host ports managed by more than one federated servers. Check can't be run.
• Skipped: No path to storage found.
Select a host enclosure and click Delete to remove the host from the ignored list and begin receiving errors
about a host you had chosen to ignore. However, you can delete entries with message Host was ignored by
user.
Step 5 Click the Ignored Storage tab to display the list of storage enclosures that have been selected to be ignored
during the redundancy check. Select a storage enclosure and click Delete to remove the storage from the
ignored list and begin receiving errors about the storage you had chosen to ignore.
Step 6 Click the Ignored Host Storage Pair tab to display the list of host-storage pairs that have been selected to
be ignored during the redundancy check. Select a row and click Delete to delete the storage pair from the
ignored list.
Note The jobs run in the background, even after you log off.
Procedure
Step 6 Click the arrow next to Current jobs to display the slow drain details for the jobs running on the fabric. The
Fabric Name, the Status of polling, Start, End, and Duration icon for each fabric is displayed.
Step 7 Select the fabric and click Result, Delete and Stopto view, delete and stop the job.
Step 8 Click Detail to view the saved information.
Step 9 Click Interface chart to display the slow drain value for the switch port in the chart format.
Step 10 Click Filter to display the details based on the defined value for each column.
Step 11 Select the Data Rows Only check box to filter and display the nonzero entries in the statistics.
Step 12 Click Print to print the slow drain details.
Step 13 Click Export to export the slow drain statistics to a Microsoft Excel spreadsheet.
Procedure
Procedure
Procedure
Step 1 To monitor the SAN Insights feature, choose Monitor > SAN > SAN Insights. The SAN Insights page
appears.
This page provides the basis for Insights data visualization showing counter data, visual topology map with
indicators on the map. Also, you can view analytical information and historical insights. In Insights Flows
window, you can perform the tasks that are mentioned in the steps below.
The color of the status is arrived as an hourly average of Read and Write deviation for the respective Initiator
Target Pairs.
Note You can click the Status circle icon in the Initiator-target Pair table to view the 24-Hour deviation
chart.
Step 5 View initiator target pair details such as Source PWWN, SID, destination PWWN, DID, fabric name, and
status.
Step 6 Use the map to view end-to-end connectivity from initiator to target. Host, storage, and switch have colored
status indications (green—healthy, yellow—warning, red—critical). The switch interfaces also have status
indications. The switch interface is rendered as a small circle at the end of the link that is attached to the
switch. Selecting a switch interface populates one of the counter tables. Map displays latest connectivity (not
affected by time slider setting).
Step 7 View counter data for selected flow and switch interface.
• Select the IT flow to display the topology and the flow metrics from the switch telemetry infrastructure
in the bottom-left table.
• Select the specific interface in the topology view to display interface metrics from port-monitoring
infrastructure.
Procedure
Step 1 Choose Monitor > SAN Insights, and then choose Host Enclosure.
Procedure
Step 1 Choose Monitor > SAN Insights, and then choose Storage Enclosure.
Viewing Flows
Procedure
Step 1 Choose Monitor > SAN Insights, and then choose Flows.
Monitoring LAN
The LAN menu includes the following submenus:
Procedure
Step 2 You can use the drop-down to filter the view by Last 10 Minutes, Last Hour, Last Day, Last Week, Last
Month, and Last Year.
There are variations to this procedure. In addition to these basic steps, you can also perform the following
steps:
• Select the name of an Ethernet port from the Name column to see a graph of the traffic across that Ethernet
port for the past 24 hours. You can change the time range for this graph by selecting it from the drop-down
list in the upper-right corner.
• To export the data into a spreadsheet, click the Export icon in the upper-right corner and click Save.
• Use the chart icons to view the traffic chart in varied views. You can also use the icons to Append,
Predict, and Interpolate Data.
• For the Rx/Tx calculation, see the following Rx/Tx calculation.
Note The conversion for Fabrics is 10 bit = 1 byte and for LAN traffic, the conversion is 8 bit = 1
byte.
• Average Rx/Tx % = Average Rx/Tx divided by Speed * 100
• Peak Rx/Tx % = Peak Rx/Tx divided by Speed * 100
Note If the performance tables do not contain any data, see the Thresholds section to turn on performance
data collection.
Procedure
Step 2 You can use the drop-down to filter the view by Last 10 Minutes, Last Hour, Last Day, Last Week, Last
Month, and Last Year.
Note NaN (Not a Number) in the data grid means that the data is not available.
There are variations to this procedure. In addition to these basic steps, you can perform the following steps
to view detailed information for ISLs:
• To change the time range for this graph, select it from the drop-down list in the upper-right corner.
• To view the detailed information for a specific period, drag the slider control to choose the time interval
for which you need the information.
• Use the chart icons to view the traffic chart in varied views. You can also use the icons to Append,
Predict, and Interpolate Data. To view real-time information, choose Real Time from the drop-down
list in the Chart menu.
• To export the data into a spreadsheet, choose Export from the drop-down list in the Chart menu and
then click Save.
• For the Rx/Tx calculation, see the following Rx/Tx calculation.
Note The conversion for Fabrics is 10 bit = 1 byte and for LAN traffic, the conversion is 8 bit = 1
byte.
• Average Rx/Tx % = Average Rx/Tx divided by Speed * 100
• Peak Rx/Tx % = Peak Rx/Tx divided by Speed * 100
Note If the performance tables do not contain any data, see the Performance Setup Thresholds section to
turn on performance.
Monitoring a vPC
The virtual port channel (vPC) feature enables you to view the links that are physically connected to different
devices as a single port channel. A vPC is an extended form of a port channel which allows you to create
redundancy and increase bisectional bandwidth by enabling multiple parallel paths between nodes and allowing
load balancing traffic. Traffic is distributed among two single device vPC endpoints. If there is an inconsistency
in the vPC configurations, the vPC does not function correctly.
Note To view the vPC in vPC Performance, both primary and secondary device should be designated to the user.
If either one kind of switch is not designated, vPC information is isplayed.
Cisco DCNM Web Client > Monitor> vPC displays only consistent vPCs displays both the consistent and
inconsistent vPCs.
You can identify the inconsistent vPCs and resolve the inconsistencies in each vPC by using the Cisco DCNM
Web UI > Configure > Deploy > vPC Peer and Web Client > Configure > Deploy > vPC.
Table 7: vPC Performance, on page 87 displays the following vPC configuration details in the data grid view.
Column Description
Search box Enter any string to filter the entries in their respective column.
Multi Chassis vPC EndPoints Displays the multi-chassis vPC endpoints for each vPC ID
under a vPC domain.
Primary vPC Peer - Device Name Displays the vPC Primary device name.
Primary vPC Peer - Primary vPC Interface Displays the primary vPC interface.
Primary vPC Peer - Capacity Displays the capacity for the primary vPC peer.
Primary vPC Peer - Avg. Rx/sec Displays the average receiving speed of primary vPC peer.
Primary vPC Peer - Avg. Tx/sec Displays the average sending speed of primary vPC peer.
Column Description
Primary vPC Peer - Peak Util% Displays the peak utilization percentage of primary vPC peer.
Secondary vPC Peer - Device Name Displays the vPC secondary device name.
Secondary vPC Peer - Capacity Displays the capacity for the secondary vPC peer.
Secondary vPC Peer - Avg. Rx/sec Displays the average receiving speed of secondary vPC peer.
Secondary vPC Peer - Avg. Tx/sec Displays the average sending speed of secondary vPC peer.
Secondary vPC Peer - Peak Util% Displays the peak utilization percentage of secondary vPC
peer.
To view the VPC performance information from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 3 Click the peer-link icon in front of the Device Name in the Primary vPC peer or Secondary vPC peer
column to view its member interface.
Step 4 Click the Show Chart icon of the corresponding interface to view its historical statistics.
The traffic distribution statistics appear at the bottom of the vPC window. By default, the Cisco DCNM Web
Client displays the historical statistics for 24 hours.
There are variations to this procedure. In addition to these basic steps, you can also perform the following
steps to view detailed information for flows:
• To change the time range for this graph, select it from the drop-down list in the upper right corner.
• To view the detailed information for a specific period, drag the slider control to choose the time interval
for which you need the information.
• Use the chart icons to view the traffic chart in varied views.
• You can also use the icons to Append, Predict, and Interpolate Data.
• To export the data into a spreadsheet, click the Export icon in the upper-right corner and click Save.
Note If the performance tables do not contain any data, see the Thresholds section to turn on performance
data collection.
Monitoring Report
The Report menu includes the following submenus:
Viewing Reports
You can view the saved reports that are based on the following selection options:
• By Template
• By User
• From the menu bar, select Monitor > Report > View.
To view the reports from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 3 To delete a specific report, select the check box and click the Delete icon.
Step 4 To delete all reports, check the check box in the header, and click the Delete icon.
Note If you have multiple fabrics, you can select the DCNM-SAN group in the Scope to view Host to
Storage connectivity of multiple fabrics in a single report.
The report is divided into two sections:
• A summary report for all the devices that have faulty modules. The table displays information for every
device that includes the device hostname, number of faulty modules, and the module number with its
PID.
• The information for the device of the module. The table contains details about the tests failed.
Generating a Report
You can generate reports based on a selected template or you can schedule the report to run at a specified
time.
Procedure
Step 1 From the menu bar, select Monitor > Report > Generate.
You see the Generate Report window.
Step 2 In the configuration window, use the drop-down to define the scope for report generation.
In the Scope drop-down, you can select a scope group with dual fabrics, the traffic data generated by hosts
and storage end devices are displayed side-by-side which enables you to view and compare traffic data
generated on dual fabrics. To view this report, in the Other Predefined folder, select Traffic by VSAN (Dual
Fabrics). Click Options to select the Device Type and Fabrics. Click Save to save the configuration.
Step 3 In the pane on the left hand, expand the folders and select the report.
Step 4 (Optional) In the pane on the right hand, you can edit the Report Name.
Step 5 (Optional) Check the Export to Csv/Excel check box to export the report in to a Microsoft Excel spreadsheet.
Step 6 In the Repeat radio buttons, if you select:
• Never - The report is generated only during the current session.
• Once - The report is generated on a specified date and time apart from the current session.
• Daily -The report is generated everyday based on the Start and End date at a specified time.
• Weekly - The report is generated once a week based on the Start and End date at a specified time.
• Monthly - The report is generated once every month based on the Start and End date at a specified time.
When you generate a report for Network Configuration Audit, the daily job generates a report for the selected
devices for last 1 day. Similarly, the weekly job generates a report for the last 7 days, and the monthly job
generates a report for the last 30 days.
Step 7 Click the Create button to generate a report based on the specifications.
You see the report results in a new browser window.
Alternatively, you can view the report by choosing Monitor > Report > View and selecting the report name
from the report template that you used in the navigation pane.
Note The Start Date must be at least five minutes earlier than the End Date.
The report is divided into two sections:
• A summary report for all the devices that have faulty modules. The table displays information for every
device that includes the device host name, number of faulty modules and the module number with its
PID.
• A detailed information for the device of the module. The table contains details about the tests failed.
Procedure
Step 1 From the menu bar, choose Monitor > Report > User Defined.
You see the Create User Defined window.
Step 2 In the Template panel, under the Name column, select CLICK TO ADD NEW CUSTOM to edit the Name
of the new report.
In the Configuration panel:
Step 3 Click Scope to define scope of the report. The default scope will have Data Center, SAN, LAN, and Fabric
configurations.
Step 4 Click Inventory and use the checkbox to select the inventory information required in the report. You can also
use the drop-down to filter by selecting the Top performance and the timeline required in the report.
Step 5 Click Performance and use the checkbox to select the performance information required in the report.
Step 6 Click Health and use the checkbox to select the health information required in the report.
Step 7 Click Save to save this report template.
A confirmation message is displayed confirming that the report is saved.
Procedure
Step 1 In the Template panel, select the report template that you want to delete.
Step 2 Click the Delete icon to delete the report.
Step 3 In the confirmation pop-up, click Yes to delete the template.
Procedure
Procedure
Step 2 Select the checkbox for a specific report and click the Delete Job icon to delete a report.
Alarms
The Alarms menu includes the following submenus:
Procedure
• Device Health: Device health policies enable you to create alarms when Device ICMP Unreachable,
Device SNMP Unreachable, or Device SSH Unreachable. Also, these policies enable you to monitor
chassis temperature, CPU, and memory usage.
• Interface Health: Interface health policies enable you to monitor Up or Down, Packet Discard, Error,
Bandwidth details of the interfaces. By default all interfaces are selected for monitoring.
• Syslog Alarm: Syslog Alarm Policy defines a pair of Syslog messages formats; one which raises the
alarm, and one which clears the alarm.
Procedure
Table 8: Example1
Identifier ID1-ID2
Table 9: Example2
Identifier ID1-ID2
Activating Policies
After you create new alarm policies, activate them.
Procedure
Deactivating Policies
You can deactivate the active alarm policies.
Procedure
Importing Policies
You can create alarm policies using the import functionality.
Procedure
Step 1 Choose Monitor > Alarms > Policies and then click the Import button.
Step 2 Browse and select the policy file saved on your computer.
You can only import policies in text format.
Exporting Policies
You can export the alarm policies into a text file.
Procedure
Step 1 From the menu bar, choose Monitor > Alarms > Policies.
Step 2 Click the Export button and then select a location on your computer to store the exported file.
Editing Policies
Procedure
Step 1 From the menu bar, choose Monitor > Alarms > Policies.
Step 2 Select the policy that you want to edit.
Step 3 Click the Edit button and then make necessary changes.
Step 4 Click the OK button.
Deleting Policies
Procedure
Step 1 From the menu bar, choose Monitor > Alarms > Policies.
Step 2 Select the policy that you want to delete.
Step 3 Click the Delete button. The policy is deleted.
Templates
The Templates menu includes the following submenu:
Template Library
The Template Library menu includes the following submenus:
Template Library
Cisco DCNM allows you to add, edit, or delete user-defined templates that are configured across different
Cisco Nexus and Cisco MDS platforms. The following parameters are displayed for each template that is
configured on the Web UI of the Cisco DCNM Configure > Templates > Template Library > Templates.
Templates support JavaScript. You can use the JavaScript function in a template to perform arithmetic
operations and string manipulations in the template syntax.
The following table describes the fields that appear on this page.
Field Description
Modify/View Template Allows you to view the template definition and modify as required.
Save Template As Allows you to save the selected template in a different name. You
can edit the template as required.
Field Description
Import Template Allows you to import a template from your local directory, one at
a time.
Export template Allows you tot export the template configuration to a local directory
location.
Import Template Zip File Allows you to import .zip file, that contains more than one
template that is bundled in a .zip format
All the templates in the ZIP file are extracted and listed in the table
as individual templates.
Field Description
Tags Displays the tag that is assigned for the template and aids to filter
templates based on the tags.
Supported Platforms Displays the supported Cisco Nexus platforms compatible with the
template. Check the check box of platforms that are supported with
the template.
Note You can select multiple platforms.
Template Sub Type Specifies the sub type that is associated with the template.
In addition, from the menu bar, choose Configure > Templates > Template Library > Templates and you
can also:
• Click Show Filter to filter the templates that is based on the headers.
• Click Print to print the list of templates.
• Click Export to Excel to export the list of template to a Microsoft Excel spreadsheet.
Template Structure
The configuration template content mainly consists of four parts. You can click on the Help icon next to the
Template Content window for information about editing the content of the template. Click on the Help icon
next to the Template Content window for information about editing the content of the template.
This section contains the following:
Template Format
This section describes the basic information of the template. The possible fields are as detailed in the table
below.
• POAP
• N/A
• VXLAN
• FABRICPATH
• VLAN
• PMN
• POLICY
• VLAN
• INTERFACE_VLAN
• INTERFACE_ETHERNET
• INTERFACE_BD
• INTERFACE_PORT_CHANNEL
• INTERFACE_MGMT
• INTERFACE_LOOPBACK
• INTERFACE_NVE
• DEVICE
• FEX
• INTERFACE
• SHOW
• VLAN
• INTERFACE_VLAN
• INTERFACE_VPC
• INTERFACE_ETHERNET
• INTERFACE_BD
• INTERFACE_PORT_CHANNEL
• INTERFACE_FC
• INTERFACE_MGMT
• INTERFACE_LOOPBACK
• PROFILE
• VXLAN
• FABRIC
• NA
• ABSTRACT
• VLAN
• INTERFACE_VLAN
• INTERFACE_VPC
• INTERFACE_ETHERNET
• INTERFACE_BD
• INTERFACE_PORT_CHANNEL
• INTERFACE_MGMT
• INTERFACE_LOOPBACK
• INTERFACE_NVE
• DEVICE
• FEX
• INTERFACE
• POAP
• TEMPLATE_CLI
• POLICY
• TEMPLATE_CLI
• PYTHON
• SHOW
• TEMPLATE_CLI
• PROFILE
• TEMPLATE_CLI
• PYTHON
• FABRIC
• PYTHON
• ABSTRACT
• TEMPLATE_CLI
• PYTHON
timestamp Shows the template modified Modified date and time in the Yes
time format YYYY-MM-DD
HH:MM:SS
Template Variables
This section contains declared variables, the data type, default values, and valid values conditions for the
parameters that are used in the template. These declared variables are used for value substitution in the template
content section during the dynamic command generation process. Also these variables are used in decision
making and in iteration blocks in the template content section. Variables have predefined data types. You can
also add a description about the variable. The following table describes the syntax and usage for the available
datatypes.
boolean true|false No
enum No
Example: running-config, startup-config
Example: 1-10,15,18,20
floatRange Yes
Example: 10.1,50.01
ipV4AddressRange Yes
Example: 172.22.31.97 - 172.22.31.99, 172.22.31.105
- 172.22.31.109
interfaceRange Yes
Example: eth10/1/20-25, eth11/1-5
string[] Yes
Example: {a,b,c,str1,str2}
ipAddress[] Yes
Example:{192.168.1.1, 192.168.1.2, 10.1.1.1}
wwn No
Example: 20:01:00:08:02:11:05:03
(Available only in the Web Client)
boolean A Yes
boolean
value.
Example:
true
enum Yes
75.56,
-8.5
ipAddress IP Yes
address
in
IPv4
or
IPv6
format
piV4AddersW
htSiubnet IPv4 Yes
Address
with
Subnet
piV6AddersW
htP
ixerif IPv6 Yes
Address
with
Prefix
piAddersW
htiouPterxif IPv4
or
IPv6
Address
(does
not
require
prefix/subnet).
macAddress MAC
address
Ethernet
5/10
piV4AddersRange Yes
{string1,
string2}
wwn WWN
address
struct Set of
parameters
that
are
bundled
under
a
single
variable.
##template variables
integer VLAN_ID {
min = 100;
max= 200;
};
string USER_NAME {
defaultValue = admin123;
minLength = 5;
};
##
Variable Annotation
You can configure the variable properties marking the variables using annotations.
Note Variable Annotations are available for POAP only. However, the annotations do not impact on the template
type ‘CLI’.
DisplayName Text
Note Enclose the text with quotes, if there is space.
Description Text
Username Text
Password Text
DataDepend Text
IsShowAnnotation
##template variables
boolean isVlan;
@(IsShow="isVlan==true")
integer vlanNo;
##
Templates Content
This section includes the configuration commands and any parameters that you want to include in the template.
These commands can include the variables declared in the template variables section. During the command
generation process the variable values are substituted appropriately in the template content.
Note You must specify the commands that you include as if you were entering them in the global configuration
command mode on any device. You must consider the command mode when you include commands.
• Iterative variables—used for block iteration. These loop variable must be accessed as shown below inside
the iteration block.
Syntax:@<loop variable>
Example:
foreach val in $$INTEGER_RANGE_VALUE$$ {
@val
}
• Scalar Structure Variable—Structure member variables can be accessed inside the template content.
• Array Structure Variable—Structure member variables can be accessed inside the template content.
In addition to the template variables, you can use the conditional and iterative command generation using the
following statements:
• if-else if-else Statement—makes a logical decision in inclusion/exclusion of set of configuration command
based on the value assigned for the variable in it.
• foreach Statement—used for iterating a block of commands. The iteration is performed based on the
assigned loop variable value.
Syntax:
foreach <loop index variable> in $$<loop variable>$$ {
@<loop index variable> ..
}
• Optional parameters—By default all parameters are mandatory. To make a parameter optional, you must
annotate the parameter.
Advanced Features
The following are the advanced features available to configure templates.
• Assignment Operation
Config template supports assignment of variable values inside the template content section. The values
are validated for the declared data type of the variable. If there is a mismatch, the value is not assigned.
Assignment operation can be used under the following guidelines:
• The operator on the left must be any of the template parameters or a for loop parameter.
• The operator on the right values can be any of the values from template parameters, for loop
parameters, literal string values surrounded by quotes or simple string values.
If a statement does not follow these guidelines, or if it does not suit this format, it will not be considered
as assignment operation. It is substituted during command generation like other normal lines.
• Evaluate methods
Config template uses the Java runtime provided Java script environment to perform arithmetic operations
(such as ADD, SUBTRACT, and so on), string manipulations, and so on.
Locate the javascript file in the template repository path. This file contains primary set of arithmetic,
string functions. You can also add custom Javascript methods.
These methods can be called from config template content section in below format:
Example1:
$$somevar$$ = evalscript(add, "100", $$anothervar$$)
You can call a method that is located at the backend of the Java script file.
• Dynamic decision
Config template provides a special internal variable “LAST_CMD_RESPONSE”. This variable stores
the last command response from the device during the execution of the command. This can be used in
the config template content to make dynamic decisions to deliver the commands that are based on the
device condition.
Note The if block must be followed by an else block in a new line, which can be empty.
An example use case to create a VLAN, if it is does not exist on the device.
Example: Create VLAN
##template content
show vlan id $$vlan_id$$
if($$LAST_CMD_RESPONSE$$ contains "not found"){
vlan $$vlan_id$$
}
else{
}
##
This special implicit variable can be used only in the “IF” blocks.
• Template referencing
You can have a base template with all the variables defined. This base template can be imported to
multiple templates. The base template content is substituted in the appropriate place of the extending
template. The imported template parameters and the contents can be accessed inside the extending
template.
Example: Template Referencing
Base template:
##template properties
name =a vlan base;
userDefined= true;
supportedPlatforms = All;
templateType = CLI;
published = false;
timestamp = 2015-07-14 16:07:52;
imports = ;
##
##template variables
integer vlan_id;
##
##template content
vlan $$vlan_id$$
##
Derived Template:
##template properties
name =a vlan extended;
userDefined= true;
supportedPlatforms = All;
templateType = CLI;
published = false;
timestamp = 2015-07-14 16:07:52;
imports = a vlan base,template2;
##
##template variables
interface vlanInterface;
##
##template content
<substitute a vlan base>
interface $$vlanInterface$$
<substitute a vlan base>
##
When you launch the extended template, the parameter inputs for the base template are also obtained.
In addition, the substituted content is used for complete CLI command generation.
• Solution POAP Templates for VXLAN and FabricPath
From Cisco DCNM Release 10.0(1), Cisco provides you a set of defined templates to aid in POAP
operations. You can download Cisco-defined templates from
https://software.cisco.com/download/release.html.
For instructions on how to download and install POAP templates, see Cisco DCNM Installation Guide,
Release 10.0(x).
Adding a Template
To add user-defined templates and schedule jobs from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 1 Choose Configure > Templates > Template Library > Templates.
The Templates window is displayed with the name of the template along with its description, supported
platforms, and tags.
Step 6 Select a Template Sub Type and Template Content Type for the template, and select Published to make
the template read-only. You cannot edit a published template.
Step 7 Click Template Content to edit the template syntax. For information about the structure of the Configuration
Template, see the Template Structure section.
Step 8 From the Imports > Template Name list, check the template check box.
The base template content is displayed in the Template Content window. The base template displays the
template properties, template variables, and template content. This template can be imported in to another
template and the base template content is substituted in the appropriate place of the extending template. When
you launch the extended template, the parameter inputs for the base template are also obtained. Also, the
substituted content is used for complete CLI command generation.
Note The base templates are CLI templates.
Procedure
Step 2 Click the Launch job creation wizard icon and click Next.
Step 3 Use the drop-down to select Device Scope.
The devices configured under the selected Device Scope are displayed.
Note If no devices are displayed, check if the device LAN credentials are configured from Cisco DCNM
Web Client > Administration > Credentials Management > LAN Credentials.
Step 4 Use the arrows to move the devices to the right column for job creation and click Next.
Step 5 In the Define Variable section, specify the VSAN_ID, VLAN_ID, ETH_SLOT_NUMBER,
VFC_SLOT_NUMBER, SWITCH_PORT_MODE, ETH_PORT_RANGE and ALLOWED_VLANS values.
Note Based on the selected template, variables will vary.
Step 6 In the Edit Variable Per Device section, double click the fields to edit the variables for specific devices and
click Next.
Step 7 If you have selected multiple devices, use the drop-down to select a specific device and preview its
configuration. Click Back to edit the configuration or click Next.
Step 8 Specify a job name and description.
The Device Credentials will be populated from Administration > Credentials Management > LAN
Credentials.
Step 9 Use the radio button to select Instant Job or Schedule Job.
If you select Schedule Job, specify the date and time for the job delivery.
Step 13 Under Delivery Options (Optional), specify the command response timeout in seconds and use the radio
button to select a delivery order. The value of command response timeout ranges from 1 to 180.
You can choose one of the following options by selecting the appropriate radio button:
• Deliver configuration one device at a time in sequential
• Delivery configuration in parallel to all devices at the same time
Modifying a Template
You can edit the user-defined templates. However, the predefined templates and templates that are already
published cannot be edited.
Procedure
Step 1 From Configure > Templates > Template Library > Templates, select a template.
Step 2 Click Modify/View template.
Step 3 Edit the template description and tags.
Step 4 From the Imports > Template Name list, check the template check box.
The base template content is displayed in the Template Content window. You can edit the template content
based on your requirement in the Template Content window. Click the help icon next to the Template
Content window for information about editing the content of the template.
Copying a Template
You can copy templates.
Procedure
Step 1 From Configure > Templates > Template Library > Templates, select a template.
Step 2 Click Save Template As.
Step 3 Edit the template name, description, tags, and other parameters.
The edited template content is displayed in the right-hand pane.
Step 4 From the Imports > Template Name list, check the template check box.
The base template content is displayed in the Template Content window. You can edit the template content
based on your requirement in the Template Content window. Click the help icon next to the Template
Content window for information about editing the content of the template.
Deleting a Template
You can delete the user-defined templates. However, you cannot delete the pre-defined templates. From Cisco
DCNM Release 11.0(1), you can delete multiple templates at once.
Procedure
Step 1 From the menu bar, select Configure > Templates > Template Library > Templates.
Step 2 Use the check box to select a template and click Remove template.
What to do next
The template will be deleted from the list of templates on the Web Client. However, when you restart the
DCNM services, the deleted templates will be displayed on the Configure > Templates > Template Library
> Templates.
To delete the template permanently, delete the template under in your local directory: Cisco
Systems\dcm\dcnm\data\templates\.
Importing a Template
Perform the following task to import a template to the Cisco DCNM.
Note You can import Cisco-defined FabricPath and IP VXLAN Programmable Fabric POAP Templates to the
Cisco DCNM Web Client. For more information, see Installing POAP Templates, on page 117.
Procedure
Step 1 Choose Configure > Templates > Template Library > Templates and click Import Template.
Step 2 Browse and select the template that is saved on your computer.
You can edit the template parameters, if necessary. For information, see Modifying a Template, on page 115.
Step 3 Click Validate Template Syntax to validate the template.
Step 4 Click Save to save the template or Save and Exit to save the template and exit.
Exporting a Template
Procedure
Step 1 From the menu bar, select Configure > Templates > Template Library > Templates.
Step 2 Use the check box to select a template and click Export Template.
The browser will request you to open or save the template to your directory.
Procedure
Step 2 Unzip and extract the files to the local directory on your computer.
Step 3 Choose Configure > Templates > Template Library > Templates.
Step 4 Click Import Template.
Step 5 Browse and select the template that is saved on your computer. You can edit the template parameters, if
necessary.
Step 6 Check POAP and Publish check box to designate these templates as POAP templates.
Step 7 Click Validate Template Syntax to validate the template.
Step 8 Click Save to save the template or Save and Exit to save the template and exit.
Configuring Jobs
Procedure
Step 1 From the menu bar, select Configure > Templates > Templates Library > Jobs.
The jobs are listed along with the Job ID, description and status.
Step 3 Select a job and click the Delete icon to delete the job.
Step 4 To view the status of a job, click the Job ID radio button and click Status.
Step 5 To view the command execution status for a device, click the radio button of a device name from the Devices
table in the Job Excecution Status window.
Note You can delete multiple jobs at once, but you cannot view the status of multiple jobs at once.
Backup
The Backup menu includes the following submenus:
Switch Configuration
This feature allows you to backup device configurations from running configuration as a regular text file in
the file system. However, you can also perform operations on startup configuration. The backup files can be
stored in the DCNM server host or on a file server.
You can also configure the archive system to support scheduling of jobs for the selected list of devices. You
can configure only one job for a switch.
The following tables describe the icons and fields that appear on Configure > Backup > Switch Configuration.
Icon Description
Restore Configuration to devices Allows you to restore configuration from the selected
devices.
Archive Jobs Allows you to add, delete, view, or modify the jobs.
Field Description
Field Description
Archive Time Displays the time when the device configuration files
were archived.
The format is Day:Mon:DD:YYYY HH:MM:SS.
Copy Configuration
You can copy the configuration files to the same device, to another device, or multiple devices concurrently.
Perform the following task to view the status of tasks.
Procedure
Step 1 From Cisco DCNM home page, choose Configure > Backup > Switch Configuration. Select any
startup/running/archive configuration of the device that you must copy.
Step 2 Click Copy Configuration to bootflash.
Copy Configuration to bootflash page appears, displaying the Source Configuration Preview and Selected
Devices area.
Source Configuration Preview area shows the contents of running/startup/version configuration file which
is copied to the devices.
Step 3 In the Selected Devices area, check the device name check box to copy the configuration to the device.
Note You can select multiple destination devices to copy the configuration.
Step 5 Click Yes to copy the configuration to the destination device configuration.
View Configuration
You can view or edit the configuration file on the device.
Perform the following task to view or edit the configuration file for the devices.
Procedure
Step 1 From Cisco DCNM home page, choose Configure > Backup > Switch Configuration. Click the arrow next
to the device name to view the configuration files on the device. Select the configuration file radio button to
view the configuration file.
Step 2 Click the View Configuration.
The View Configuration window appears showing the configuration file content.
Delete Configuration
Perform the following task to delete the configuration file from the device.
Note Ensure that you take a backup of the configuration file before you delete.
Procedure
Step 1 From Cisco DCNM home page, choose Configure > Backup > Switch Configuration. Click the arrow next
to the device name to view the configuration files on the device.
Step 2 Click the configuration file radio button to be deleted.
Note You can delete multiple configuration files. However, you cannot delete startup, or running
configuration files.
Procedure
Step 1 Navigate to Configure > Backup > Switch Configuration. Click the arrow next to the device name to view
the configuration files on the device.
Step 2 Check the check box and select two configuration files to compare.
The first file that you selected is designated as Source and the second configuration file is designated as the
Target file.
Step 4 Click Copy to Target to copy the source configuration to the target configuration file. Click Cancel to revert
to the configuration details page.
The Copy Configuration window displays the source configuration preview and the target device of the
destination configuration. The selected devices area shows the following fields:
• Device Name—Specifies the target device name to which the source configuration is copied.
• IP Address—Specifies the IP Address of the destination device.
• Group—Specifies the group to which the device belongs.
• Status—Specifies the status of the device.
Step 5 Click Yes to copy the configuration to the destination device configuration.
Export Configuration
You can export a configuration file from the Cisco DCNM server. Perform the following task to export a
configuration file.
Procedure
Step 1 From Cisco DCNM home page, choose Configure > Backup, select a configuration to export.
Step 2 Click Export Configuration.
The files are downloaded.
Procedure
Step 1 From Cisco DCNM home page, choose Configure > Backup > Switch Configuration and click Import
User-Defined Configuration.
The file server directory opens.
Step 2 Browse the directory and select the configuration file that you want to import. Click Open.
A confirmation screen appears.
Restore Configuration
You can restore the configuration file from the selected switches. From Cisco DCNM Release 11.0(1), you
can restore configuration based on the selected date as well.
Note You cannot restore the configuration for SAN switches and FCoE-enabled switches.
Perform the following task to restore the configuration from the selected devices.
Procedure
Step 1 From Cisco DCNM home page, choose Configure > Backup > Switch Configuration, and click Restore.
Step 2 Select the type of restore from the drop-down list. You can choose Version-based or Date-based.
Note • If you choose date-based restore, you have to select the date and time. The configuration
available before the mentioned time is restored.
• If you choose version-based restore, you have to choose a configuration from the Configuration
column. You can view the configuration details in the View column.
Step 3 Check the Device Name check box from which you want to restore the configuration. Click Restore.
The Devices area shows the following fields:
• Device Name—Specifies the device name from which the configuration file is restored.
• IP Address—Specifies the IP Address of the device.
• Group—Specifies the group to which the device belongs.
• Status—Specifies the status of the device.
Note You can restore the configuration only from the same device. If you select user-imported
configuration files, you can restore configuration for any number of devices.
Archive Jobs
This section contains context-sensitive online help content under Cisco DCNM Configure > Backup > Switch
Configuration > Archive Jobs.
The following table describes the fields that appear on the Archive Jobs window.
Field Description
Group Job
Last Execution Specifies the date and time at which this job was last
executed.
Archive Jobs
You can add, delete or view the job.
Note You must set the SFTP/TFTP/SCP credentials before you configure jobs. On the DCNM Web Client, navigate
to Administration > DCNM Server > Archive FTP Credentials to set the credentials.
Procedure
Step 1 To add a job, from the Cisco DCNM home page, choose Configure > Backup > Switch Configuration >
Archive Jobs > Archive Jobs tab, and click Add Job.
The Create Job screen displays the Schedule, Device Selection and Selected Devices.
A backup will be scheduled as defined.
a) In the Schedule area, configure the start time, repeat interval and repeat days.
• Start At—Configure the start time using the hour:minutes:second drop-down lists.
• Once—Configure the job to be executed once, on the particular day. The time at which this job
will be executed is determined by the Start At field.
• Now—Configure the job to be executed immediately. Cisco DCNM will consider the default
date and time as configured on the server.
Note You can schedule a job to run Now even if a job is already scheduled.
• Daily—Check the check box on the days you want this job to be executed. The time at which
this job will be executed is determined by the Start At field.
• Real Time—Configure the job to be executed if there is any configuration changes in the device.
The device must be quiet for 5 minutes, after which the DCNM Sever will execute this job.
• Repeat Interval—Check the Repeat Interval check box to repeat the job at scheduled intervals.
Configure the intervals using either days or hours drop-down list.
• Comments—Enter your comments, if any.
b) In the Device Selection area, use the radio button to choose one of the following:
• Device Group—Click the Device Group radio button to select the entire group of devices for this
job.
Select the Device Group from the drop-down list.
Note When the devices are not licensed, they will not be shown under the group on the Cisco
DCNM Configure > Backup > Switch Configuration > Archive Jobs. When none of
the devices under a group is licensed, the group alone will be shown with no devices, until
a device under that group is licensed.
• Selected Devices—Click the Selected Devices radio button to select one of multiple devices from
various groups for this job.
Select the devices from the drop-down list.
Note When the SAN and LAN credentials are not configured for a switch, it will not be listed in the
Selected Devices drop-down list. To configure, navigate to Administration > Credentials
Management > SAN Credentials and Administration > Credentials Management > LAN
Credentials.
Note If a job for a device exists under device level, you can create a group level job which includes
this switch as part of that group. However, this switch will be excluded during the execution of
the job.
What to do next
You can also configure the Cisco DCNM to retain the number of archived files per device. From Cisco DCNM
home page, choose Administration > DCNM Server > Server Properties, and update the
archived.versions.limit field.
Field Description
User Specifies the persona of the person who created the job.
Device Group Specifies fabric or the LAN group under which the job was created.
Server Specifies the IP Address of the DCNM Server to which the device is associated with.
Execution time Specifies the time at which the job was last executed.
Field Description
Error Cause Specifies the error if the job has failed. The categories are as follows:
• No change in the configuration.
• Switch is not managed by this server.
Note If the error cause column is empty, it implies that the job was executed
successfully.
Archives
A user with network operator role can view configuration archives for a switch and their details in the Archives
window.
The following tables describe the icons and fields that are displayed in this window.
Icon Description
Procedure
Step 1 In the Cisco DCNM home page, choose Configure > Backup > Archives.
Step 2 In the Archives area, click the arrow adjacent the name of the device whose configuration files you want to
view. The list of configuration files is displayed.
Step 3 Check the check box next to configuration files and select two configuration files to compare.
The first file you select is designated as source and the second configuration file is designated as the target
file.
View Configuration
You can view an archived configuration file.
To view or edit the configuration file for the devices from the Cisco DCNM Web UI, perform the following
steps:
Procedure
Step 2 Click the arrow that is next to the name of the device whose configuration files you want to view.
The list of configuration files are displayed.
Step 3 Select the radio button that is next to the corresponding file you want to view.
Step 4 Click the View configuration icon.
The View configuration window appears showing the configuration file content in the right column.
Procedure
Step 2 In the Devices drop-down list, choose the devices to generate a report.
Step 3 Specify the Start Date and the End Date.
Step 4 Click Generate Report to view the configuration differences. The configuration differences are color-coded.
• Red: Deleted Configuration
• Green: Newly Added Configuration
• Blue: Changed configuration
• Strikethrough: Old configuration
After you generate a report, you can export the configuration reports into an HTML file.
Procedure
Step 4 In the Repeat field, choose the appropriate repeat interval, that is, Daily, Weekly, or Monthly.
Daily job generates a report of configuration differences for all the selected devices for last 1 day. Weekly
job generates a report for the last 7 days, and the monthly job generates a report for the last 30 days.
Step 5 In the Start and End date fields, specify the start and end date for the report.
Step 6 In the Email Report field, specify the email delivery options.
• No: Select this option if you do not want to send the report through email.
• Link Only: Select this option if you want to send the link to the report.
• Contents: Select this option if you want to send the report content.
If you select Link Only or the Contents option, enter the email address and subject in the To and Subject
fields.
Procedure
Procedure
Step 3 Select the reports that you want to delete, and click the Delete icon.
Image Management
The Image Management menu includes the following submenus:
Upgrade [ISSU]
The Upgrade [ISSU] menu includes the following submenus:
Field Description
Task Id Specifies the serial number of the task. The latest task will be
listed in the top.
Note If Failover is triggered in Native HA, the Task Id
sequence number is incremented by 32.
Devices Displays all the devices that were selected for this task.
Created Time Specifies the time when the task was created.
Comment Shows any comments that the Owner has added while
performing the task.
Note After a fresh Cisco DCNM installation, this page will have no entries.
New Installation
Perform the following task to upgrade the devices that are discovered by Cisco DCNM.
Procedure
Step 1 Choose Configure > Image Management > Upgrade [ISSU] > Upgrade History, click New Installation
to install, or upgrade the kickstart and the system images on the devices.
The devices with default VDCs are displayed in the Select Switches window.
Step 2 Select the check box to the left of the switch name.
You can select more than one device and move the devices to the right column.
Step 3 Click Add or Remove icons to include the appropriate switches for upgrade.
The selected switches appear in a column on the right.
Step 4 Click Next to navigate to Specify Software Images window. This tab displays the switches that you selected
in the previous screen and allows you to choose the images for upgrade.
• The Auto File Selection check box enables you to specify a file server, an image version, and a path
where you can apply the upgrade image to the selected devices.
• In the Select File Server drop-down list, select the one of the file servers that is created in the Cisco
DCNM repositories.
• In the Image Version field, specify the image version. For example, enter 7.3.9.D1.1 in the Image
Version field if you have selected m9700-sf3ek9-kickstart-mz.7.3.0.D1.1.bin as the image version.
• In the Path field, specify the image path. Specify an absolute path if you choose SCP or SFTP. For
example, //root/images/. Specify a relative path with respect to the FTP or TFTP home directory if you
choose FTP or TFTP. Specify the absolute path of the image if you are using TFTP server that is provided
by Cisco DCNM, local DCNM TFTP. You cannot use the same DCNM TFTP server for creating another
job when the current job is in progress.
Step 7 On the Software Image Browser screen, you can choose the kickstart image from File Server or Switch
File System.
If you choose File Server:
a) From the Select the File server list, choose the appropriate file server on which the kickstart image is
stored.
The servers at Configure > Image Management > Repositories are displayed in the drop-down list.
b) From the Select Image list, choose the appropriate kickstart image. Check the check box to use the same
image for all other selected devices of the same platform.
Example: For platform types N7K-C7009 and N7K-C7010, logic matches platform (N7K) and three
characters (C70) from subplatform. The same logic is used across all platform switches.
c) Click OK to choose the kickstart image or Cancel to revert to the Specify Software Images page.
If the file server selected is either ftp or tftp, in the text box, enter the relative path of the file from
the home directory.
Step 9 In the Available Space column, specify the available space for the Primary Supervisor and Secondary
Supervisor modules of the switch.
Available Space column shows the available memory in MB on the switch (for less than 1 MB, it is shown
and marked as KB).
Bootflash browser shows the file name, size, and last modified date for all the files and directories on the
switch bootflash. You can delete files by selecting them and clicking Delete to increase the available space
on the switch.
Step 10 Selected Files Size column shows the size of images that are selected from the SCP or SFTP server.
If the total size of selected images is greater than available space on a switch, the file size is marked in red.
We recommend that you create more space on the switch to copy images to it and install.
Step 11 Drag and drop the switches to reorder the upgrade task sequence.
Step 12 Select Skip Version Compatibility if you are sure that the version of the Cisco NX-OS software on your
device is compatible with the upgrade images that you have selected.
Step 13 Select Select Parallel Line Card upgrade to upgrade all the line cards at the same time.
Upgrading a parallel line card is not applicable for Cisco MDS devices.
Step 14 Select Options under the Upgrade Options column to choose the type of upgrade.
Upgrade Options window appears with two upgrade options. The drop-down menu for Upgrade Option 1
has the following options:
• NA
• bios-force
• non-disruptive
The drop-down menu for Upgrade Option 2 has the following options:
• NA
• bios-force
When NA is selected under Upgrade Option 1, Upgrade Option 2 is grayed out. When bios-force is selected
under Upgrade Option 1, NA is the only option under Upgrade Option 2. When non-disruptive is selected
under Upgrade Option 1, you can choose NA or bios-force under Upgrade Option 2.
Check the Use this Option for all other selected devices check box to use the selected option for all the
selected devices and click OK.
Note • The upgrade options are applicable only for Cisco Nexus 3000 series switches and Cisco Nexus
9000 series switches.
• Selecting the non-disruptive option for upgrading does not ensure a non-disruptive upgrade.
Perform a compatibility check to ensure that the device supports non-disruptive upgrade.
Step 21 You can choose the execution mode based on the devices and the line cards you have chosen to upgrade.
1. Select Sequential to upgrade the devices in the order in which they were chosen.
2. Select Concurrent to upgrade all the devices at the same time.
The Installation wizard closes and a task to Upgrade is created on the Configure > Image Management >
Upgrade [ISSU] > Upgrade History page.
Finish Installation
You can choose to complete the installation for tasks which was completed on the Compatibility Check
page. Perform the following task to complete the upgrade process on the devices.
Procedure
Step 1 Choose Configure > Image Management > Upgrade [ISSU] > Upgrade History, select a task for which
the compatibility check is complete.
Select only one task at a time.
Step 3 Check the check box to save the running configuration to the startup configuration before upgrading the
device.
Step 4 Check the check box to put a device in maintenance mode before upgrade. This option is valid only for the
devices that support maintenance mode.
Step 5 You can schedule the upgrade process to occur immediately or later.
1. Select Deploy Now to upgrade the device immediately.
2. Select Choose time to Deploy and specify the time in DD/MM/YYYY HH:MM:SS format to perform
the upgrade later.
Step 6 You can choose the execution mode based on the devices and the line cards that you have chosen to upgrade.
1. Select Sequential to upgrade the devices in the order in which they were chosen.
2. Select Concurrent to upgrade the devices at the same time.
View
Perform the following task to view the status of tasks.
Procedure
Step 1 Choose Configure > Image Management > Upgrade [ISSU] > Upgrade History, check the task ID check
box.
Select only one task at a time.
Step 3 Click Settings. Select Columns and choose the column details options.
This window displays the location of the kickstart and system images, compatibility check status, installation
status, descriptions, and logs.
Delete
Perform the following task to delete a task.
Procedure
Step 1 Choose Configure > Image Management > Upgrade [ISSU] > Upgrade History, and check the task ID
check box.
Step 2 Click Delete.
Step 3 Click OK to confirm deletion of the job.
Field Description
Click the radio button next to the switch name to select the switch for which you need to view the upgrade
history. Click View to view the upgrade task history for the selected switch.
The following table describes the fields that appear on Configure > Image Management > Upgrade [ISSU]
> Switch Level History > View > Upgrade Tasks History:
Field Description
System Image Specifies the system image that is used to upgrade the
switch.
Completed Time Specifies the date and time at which the upgrade was
successfully completed.
Patch [SMU]
The Patch [SMU] menu includes the following submenus:
Field Description
Task Id Specifies the serial number of the task. The latest task
will be listed in the top.
The tasks are performed in the sequential order.
Switch Name Specifies the name of the switch for which the patch
file is installed.
Field Description
Install Patch
Perform the following task to install the patch on your devices using Cisco DCNM.
Procedure
Step 1 Choose Configure > Image Management > Patch [SMU] > Installation History, click Install.
The Select Switches window appears. All the Cisco Nexus licensed switches that are discovered by Cisco
DCNM are displayed.
Step 2 Select the check box to the left of the switch name.
You can select more than one device.
Step 3 Click Add or Remove icons to include the appropriate switches for installing the patch.
The selected switches appear in the right hand column.
Step 6 In the SMU Package Browser screen, you can choose the patch file from File Server or Switch File System.
If you choose File Server:
a) From the Select the file server list, choose the appropriate file server on which the patch is stored.
The servers at Configure > Image Management > Repositories are displayed in the drop-down list.
b) From the Select Image list, choose the appropriate patch that must be installed on the device.
You can select more than one patch file to be installed on the device.
Note If the patch installation results in the restart of the device, select only one patch file.
Check the check box to use the same patch for all other selected devices of the same platform.
c) From the Select Vrf list, choose the appropriate virtual routing and forwarding (VRF).
The two options in the drop-down list are management and default.
Check the check box to use the same VRF for all other selected devices.
d) Click OK to choose the patch image or Cancel to revert to the SMU installation wizard.
If you choose Switch File System:
a) From the Select Image list, choose the appropriate patch file image that is located on the flash memory
of the device.
You can select more than one patch file to be installed on the device.
b) Click OK to choose the image, Clear Selections to uncheck all the check boxes, or Cancel to revert to
the SMU Package Browser screen.
Step 7 Click Finish.
You will get a confirmation window. Click OK.
Note SMU installation may reload the switch if the SMU is reloaded.
You can view the list of patches that are installed on the switch, on the DCNM > Inventory > Switches
window.
Uninstall Patch
Perform the following task to uninstall the patch on your devices using Cisco DCNM.
Procedure
Step 1 Choose Configure > Image Management > Patch [SMU] > Installation History, click Uninstall.
The Select Switches page appears. Cisco Nexus licensed switches that are discovered by Cisco DCNM are
displayed.
Step 2 Check the check box on the left of the switch name.
You can select more than one image device.
Step 3 Click Add or Remove icons to include the appropriate switches for installing the patch.
The selected switches appear in a column on the right.
Step 6 Select the patches that you want to uninstall from this device.
You can select more than one patch that is applied on the device.
Note If the patch uninstallation results in the restart of the device, select only one patch.
Note SMU uninstallation may reload the switch if the SMU is reloaded.
Procedure
Step 1 Choose Configure > Image Management > Patch [SMU] > Installation History, check the task ID check
box.
Step 2 Click Delete.
Step 3 Click OK to confirm deletion of the patch installation task.
Field Description
Package [RPM]
The Package [RPM] menu includes the following submenus:
Field Description
Task Id Specifies the serial number of the task. The latest task
is listed in the top.
The tasks are performed in the sequential order.
Switch Name Specifies the name of the switch for which the
package file is installed.
Procedure
Step 1 Choose Configure > Image Management > Package [RPM] > Installation History, click Install.
The Select Switches page appears.
Step 2 Check the check box on the left of the switch name.
You can select more than one device.
Step 3 Click Add or Remove to include appropriate switches for installing packaging.
The selected switches appear in a column on the right.
Step 6 Choose the package file from File Server or Switch File System.
If you choose File Server:
a) From the Select the file server list, choose the appropriate file server on which the package is stored.
The servers at Configure > Image Management > Repositories are displayed in the drop-down list.
b) From the Select Image list, choose the appropriate package that must be installed on the device.
You can select only one package file to be installed on the device.
Check the check box to use the same package for all other selected devices of the same platform.
c) Click OK to choose the patch image or Cancel to revert to the RPM Installation Wizard.
If you choose Switch File System:
a) From the Select Image list, choose the appropriate package file image that is located on the flash memory
of the device.
You can select only one package file to be installed on the device.
b) Click OK.
Step 7 In the Installation Type column, choose one of the installation types:
• Normal—Fresh installation
• Upgrade—Upgrading the existing RPM
• Downgrade—Downgrading the existing RPM
Procedure
Step 1 Choose Configure > Image Management > Package [RPM] > Installation History, click Uninstall.
The Select Switches window appears.
Step 2 Check the check box on the left of the switch name.
You can select more than one switch.
Step 3 Click the Add or Remove icons to include the appropriate switches for uninstalling the package.
The selected switches appear in a column on the right.
Procedure
Step 1 Choose Configure > Image Management > Package [RPM] > Installation History, select the task ID
check box.
Step 2 Click Delete.
Step 3 Click OK to confirm deletion of the task.
Field Description
Procedure
Step 1 Choose Configure > Image Management > Maintenance Mode [GIR] > Maintenance Mode, check the
switch name check box.
You can select multiple switches.
Step 2 Choose one of the following options under the Mode Selection column:
• Shutdown
• Isolate
Note Click the appropriate option before you change the mode.
Field Description
Task Id Specifies the serial number of the task. The latest tasks
that are listed in the top.
Switch Name Specifies the name of the switch for which the
maintenance mode was changed.
Field Description
Click the radio button next to the switch name to select the switch for which you need to view the upgrade
history. Click View to view the upgrade task history for the selected switch.
The following table describes the fields that appear on Configure > Image Management > Upgrade [ISSU]
> Switch Level History > View > Upgrade Tasks History
Field Description
System Image Specifies the system image that is used to upgrade the
switch.
Completed Time Specifies the date and time at which the upgrade was
successfully completed.
Repositories
This feature allows you to add image servers and configuration servers information to fetch images for Upgrade,
Patch, and POAP mode operations.
You can specify valid servers for SCP/SFTP/FTP/TFTP. DCNM does not perform the validation for
SCP/SFTP/FTP/TFTP servers while creating or updating the servers. DCNM performs validation only for
the SCP servers.
Note The SCP repositories use SSH protocol for the directory listing and therefore you need to enable SSH on the
SCP repository server. The SFTP repository uses SFTP protocol for directory listing. The TFTP and FTP
repositories do not support directory listing. You need to specify the file path manually.
Procedure
Step 1 On the Image and Configuration Servers window, click the Add icon.
The Add Image or Configuration Server URL window appears.
Step 4 Enter the hostname or IP address and the path to download or upload files.
Step 5 Specify the username and password.
Step 6 Click OK to save.
Procedure
Step 1 On the Image and Configuration Servers window, select an existing image from the list, and click Delete.
Step 2 In the delete notification, click Yes to delete the image and configuration server.
Note The default SCP Repository cannot be deleted.
Procedure
Step 1 On the Image and Configuration Servers window, select an existing image and configuration server from
the list, and click Edit.
Step 2 In the Edit Image or Configuration Server URL window, edit the required fields.
Step 3 Click OK to save or click Cancel to discard the changes.
File Browser
You can view the contents of the server on the Image and Configuration Servers page.
1. In the Image and Configurations page, check the Server Name check box to view the content.
2. Click File Browser to view the contents of this server.
Image Upload
Perform the following task to upload different types of images to the server. Devices use these images during
POAP.
Procedure
Step 1 On the Image and Configuration Servers window, check the server name check box to select the server for
uploading images.
The Select Image File window appears.
Step 2 Click Browse to select the image file from the directory.
Step 3 From the Platform drop-down list, select the device to which you need to upload this image.
Step 4 From the Type drop-down list, select the type of the image you are uploading to the device.
Step 5 Click OK.
The image is uploaded to the repository.
SAN
The SAN menu includes the following submenus:
VSANs
Beginning with Cisco DCNM Release 11, you can configure and manage VSANs from the Cisco DCNM.
From the menu bar, choose Configure > SAN > VSAN to view VSAN information. You can view or configure
VSAN for the discovered fabrics, with either Manageable or Manage Continuously status. For the selected
fabric, a VSAN Scope tree is displayed in the left panel.
You can achieve higher security and greater stability in Fibre Channel fabrics by using virtual SANs (VSANs)
on Cisco Data Center Switches and Cisco MDS 9000 Family switches. VSANs provide isolation among
devices that are physically connected to the same fabric. With VSANs, you can create multiple logical SANs
over a common physical infrastructure. Each VSAN can contain up to 239 switches and has an independent
address space that allows identical Fibre Channel IDs (FC IDs) to be used simultaneously in different VSANs.
Note Cisco DCNM does not discover, nor display any suspended VSAN.
The information that is associated with the selected VSAN scope appears in the right panel. If a VSAN is
segmented, each individual segmented VSAN is a VSAN scope. For every selected VSAN scope, you can
view information in tabs.
• Switches tab
• ISLs tab
• Host Ports tab
• Storage tab
• Attributes tab
• Domain ID tab
• VSAN Membership tab
For description on all fields that appear on the tabs, refer Field and Descriptions for VSANs, on page 156.
A VSAN is in the operational state if the VSAN is active and at least one port is up. This state indicates that
traffic can pass through this VSAN. This state cannot be configured.
Interoperability enables the products of multiple vendors to come into contact with each other. Fibre Channel
standards guide vendors towards common external Fibre Channel interfaces. You can enable FICON in up
to eight VSANs.
This section describes VSANs and includes the following topics:
VSAN Topologies
The following figure shows a fabric with three switches, one on each floor. The geographic location of the
switches and the attached devices is independent of their segmentation into logical VSANs. No communication
between VSANs is possible. Within each VSAN, all members can talk to one another.
Figure 1: Logical VSAN Segmentation – 79532.ps
The following shows a physical Fibre Channel switching infrastructure with two defined VSANs: VSAN 2
(dashed) and VSAN 7 (solid). VSAN 2 includes hosts H1 and H2, application servers AS2 and AS3, and
storage arrays SA1 and SA4. VSAN 7 connects H3, AS1, SA2, and SA3.
The four switches in this network are interconnected by trunk links that carry both VSAN 2 and VSAN 7
traffic. The inter-switch topology of both VSAN 2 and VSAN 7 are identical. This is not a requirement and
a network administrator can enable certain VSANs on certain links to create different VSAN topologies.
Without VSANs, a network administrator would need separate switches and links for separate SANs. By
enabling VSANs, the same switches and links may be shared by multiple VSANs. VSANs allow SANs to be
built on port granularity instead of switch granularity. Figure 1-2 illustrates that a VSAN is a group of hosts
or storage devices that communicate with each other using a virtual topology defined on the physical SAN.
The criteria for creating such groups differ based on the VSAN topology:
• VSANs can separate traffic based on the following requirements:
• Different customers in storage provider data centers
• Production or test in an enterprise network
• Low and high security requirements
• Back up traffic on separate VSANs
• Replicating data from user traffic
VSAN Advantages
VSANs offer the following advantages:
• Traffic isolation—Traffic is contained within VSAN boundaries and devices reside only in one VSAN
ensuring absolute separation between user groups, if desired.
• Scalability—VSANs are overlaid on top of a single physical fabric. The ability to create several logical
VSAN layers increases the scalability of the SAN.
• Per VSAN fabric services—Replication of fabric services on a per VSAN basis provides increased
scalability and availability.
• Redundancy—Several VSANs created on the same physical SAN ensure redundancy. If one VSAN fails,
redundant protection (to another VSAN in the same physical SAN) is configured using a backup path
between the host and the device.
• Ease of configuration—Users can be added, moved, or changed between VSANs without changing the
physical structure of a SAN. Moving a device from one VSAN to another only requires configuration at
the port level, not at a physical level.
Up to 256 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and another is
an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
VSAN Configuration
VSANs have the following attributes:
• VSAN ID—The VSAN ID identifies the VSAN as the default VSAN (VSAN 1), user-defined VSANs
(VSAN 2 to 4093), and the isolated VSAN (VSAN 4094).
• State—The administrative state of a VSAN can be configured to an active (default) or suspended state.
Once VSANs are created, they may exist in various conditions or states.
• The active state of a VSAN indicates that the VSAN is configured and enabled. By enabling a
VSAN, you activate the services for that VSAN.
• The suspended state of a VSAN indicates that the VSAN is configured but not enabled. If a port is
configured in this VSAN, it is disabled. Use this state to deactivate a VSAN without losing the
VSAN’s configuration. All ports in a suspended VSAN are disabled. By suspending a VSAN, you
can preconfigure all the VSAN parameters for the whole fabric and activate the VSAN immediately.
• VSAN name—This text string identifies the VSAN for management purposes. The name can be from 1
to 32 characters long and it must be unique across all VSANs. By default, the VSAN name is a
concatenation of VSAN and a four-digit string representing the VSAN ID. For example, the default name
for VSAN 3 is VSAN0003.
• Load balancing attributes—These attributes indicate the use of the source-destination ID (src-dst-id) or
the originator exchange OX ID (src-dst-ox-id, the default) for load balancing path selection.
Note OX ID-based load balancing of IVR traffic from IVR-enabled switches is not
supported on Generation 1 switching modules. OX ID-based load balancing of
IVR traffic from a non-IVR MDS 9000 Family switch should work. Generation
2 switching modules support OX ID-based load balancing of IVR traffic from
IVR-enabled switches.
• Load balancing attributes indicate the use of the source-destination ID (src-dst-id) or the originator
exchange OX ID (src-dst-ox-id, the default) for load balancing path selection.
Types of VSAN
The following are the different types of VSAN:
Default VSAN
The factory settings for switches in the Cisco MDS 9000 Family have only the default VSAN 1 enabled. We
recommend that you do not use VSAN 1 as your production environment VSAN. If no VSANs are configured,
all devices in the fabric are considered part of the default VSAN. By default, all ports are assigned to the
default VSAN.
Up to 256 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and another is
an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
Isolated VSAN
VSAN 4094 is an isolated VSAN. All non-trunking ports are transferred to this VSAN when the VSAN to
which they belong is deleted. This avoids an implicit transfer of ports to the default VSAN or to another
configured VSAN. All ports in the deleted VSAN are isolated (disabled).
Note When you configure a port in VSAN 4094 or move a port to VSAN 4094, that port is immediately isolated.
Up to 256 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and another is
an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
• VSAN-based runtime (name server), zoning, and configuration (static routes) information is removed
when the VSAN is deleted.
• Configured VSAN interface information is removed when the VSAN is deleted.
Note The allowed VSAN list is not affected when a VSAN is deleted.
Any commands for a non-configured VSAN are rejected. For example, if VSAN 10 is not configured in the
system, then a command request to move a port to VSAN 10 is rejected.
Parameters Default
Parameters Default
Beginning with Release 11, you can configure VSAN using a wizard that facilitates creating VSANs on
multiple switches in a managed Fabric. Choose Configure > SAN > VSAN. After you select a Fabric from
the drop-down list, click Create VSAN Wizard icon. The Welcome screen of the wizard is displayed.
Note Ensure that you provide Switch credentials, if you are different from the Discover user. To provide SAN
credentials, navigate to Administration > Credentials Management > SAN Credentials.
To create and configure VSANs from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 2 In the Select VSAN ID and Name window, perform the following steps:
a) Ensure that the correct Fabric is against the Fabric field.
b) In the VSAN ID field, select VSAN ID from the drop-down list.
The range is from 2 to 4094 for the list of VSAN ID that is available to be created in at least one Switch
in the Fabric. VSAN ID 4079 is for reserved VSAN.
c) In the Name field, enter a name for VSAN.
Note If the field is left blank, the Switch assigns a default name to the VSAN.
d) Click FICON checkbox to enable FICON on the switch.
e) Click Next.
Step 3 In the Select Switches screen, click the checkbox next to the Switch Name, to create the VSAN.
If the switch name is grayed out, it implies that the switch is already a part of VSAN. It may also imply that
the switch does not have FICON feature enabled, if FICON is checked in the previous step.
Click Next.
Step 4 In the Config VSAN Attributes screen, configure the VSAN attributes.
Note If you create a VSAN in a suspended state, it will not appear on the Cisco DCNM as DCNM does
not manage suspended VSANs.
a) In the LoadBalancing, select the load balancing type to be used on the VSAN.
The following types are available:
• srcIdDestId: based on only source ID (S_ID) and destination ID (D_ID).
• srcIdDestIdOxId: Originator exchange ID (OX_ID) is also used for load balancing in addition to
S_ID and D_ID. OX_ID is an exchange ID assigned by the originator Interconnect Port for an
exchange with the target Interconnect Port.
Note srcId/DestId/OxId is the default for non-FICON VSAN and it is not available for FICON VSAN,
srcId/DestId is the default for FICON VSAN.
b) In the InterOp field, select the interoperability value the drop-down list.
The InterOp value is used to interoperate with different vendor devices. You can choose from one of the
following:
• 0: implies that the interoperability is disabled.
• 1: implies that the VSAN can interoperate with all the Fibre Channel vendor devices.
• 2: implies that the VSAN can interoperate with specific Fibre Channel vendor devices for basic to
advanced functionalities.
• 3: implies that the VSAN can interoperate with specific Fibre Channel vendor devices for basic to
advanced functionalities.
• 4: implies that the VSAN can interoperate with specific Fibre Channel vendor devices for basic to
advanced functionalities.
c) In the Admin State field, select the configurable state for this VSAN.
• active: implies that the VSAN is configured and services for this VSAN is activated.
• suspended: implies that the VSAN is configured, but the service for this VSAN is deactivated.
Choose this state to preconfigure all the VSAN parameters for the whole Fabric.
Note DCNM does not manage a suspended VSAN, and therefore it will not appear in the VSAN
scope.
Step 7 In the Summary screen, verify if you have configured the VSAN correctly.
Click Previous to navigate to the earlier screen and modify the configuration.
Click Cancel to discard the configuration.
Click Finish to confirm and configure the VSAN. The VSAN creation result is displayed at the bottom of the
window.
Note After the VSAN is created, it will take few minutes for the new VSAN to appear in the VSAN scope
tree.
Delete VSAN
To delete a VSAN and its attributes from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 2 From the Fabric drop-down list, select the Fabric to which the VSAN is associated.
The VSAN scope tree for the selected Fabric is displayed in the VSAN area.
Step 3 Expand the Fabric and select the VSAN that you want to delete.
Note You cannot delete Segmented VSAN.
Step 5 Select the checkbox of the Switch for which you want to remove the VSAN.
Click Delete.
A confirmation window appears.
Step 6 Click Yes to confirm the deletion or click No to close the dialog box without deleting the VSAN.
Note After the VSAN is deleted, it will take few minutes for the new VSAN to disappear from the VSAN
scope tree.
Switches tab
This tab displays Switches in the VSAN scope. Click on the Switch name to view the summary information
of the switch. The following table describes the fields that appear on the Switches tab.
Field Description
Name Specifies the name of the switch in the VSAN.
Click on the name to view the switch summary. for description about the fields in the Switch
Summary, refer to Viewing Inventory Information for Switches, on page 33.
Click Show more Details to view complete information.
ISLs tab
This tab displays information about the ISLs about the switches in the VSAN scope. Click on the Switch name
to view the summary information. Click Show more details to view complete information on the selected
switch. The following table describes the fields that appear on the ISLs tab.
Field Description
VSANs All VSANs which this ISL runs traffic on.
From Switch The source switch of the link.
From Interface The port index of source E_port of the link.
To Switch The switch on the other end of the link.
To Interface The port index of destination E_port of the link.
Speed The speed of this ISL.
Status The operational status of the link.
Port Channel The member of Port Channel if ISL is a Port Channel.
Members
Additional Info Additional information for this ISL, eg. TE/TF/TNP ISL
Icons
Field Description
Total The number next to Total specifies the entries under this tab.
Refresh Icon Click on the Refresh icon to refresh the entries.
Field Description
Enclosure The name of the enclosure.
device Alias The device alias of this entry.
Port WWN The assigned PWWN for this host.
FcId The FC ID assigned for this host.
Switch Interface on the switch that is connected with the end device.
Interface
Link Status The operational status of the link.
Vendor Specifies the name of the vendor.
Model Specifies the name of the model.
Firmware The version of the firmware executed by this HBA.
Driver The version of the firmware executed by this HBA.
Additional Info The information list corresponding to this HBA.
Icons
Total The number next to Total specifies the entries under this tab.
Refresh Click on the Refresh icon to refresh the entries.
Storage tab
This tab displays information about the storage ports on the switches in the VSAN scope. The following table
describes the fields that appear on the Storage Ports tab.
Field Description
Enclosure The name of the enclosure.
device Alias The device alias of this entry.
Port WWN The assigned PWWN for this host.
FcId The FC ID assigned for this host.
Field Description
Switch Interface on the switch that is connected with the end device.
Interface
Link Status The operational status of the link.
Icons
Total The number next to Table specifies the entries under this tab.
Refresh Click on the Refresh icon to refresh the entries.
Attributes tab
This tab displays the attributes of all the switches in the VSAN scope. The following table describes the fields
that appear on the Attributes tab.
Field Description
Edit Click Edit to modify the attributes of the VSAN and to push the same VSAN attributes to
the selected switches.
If the VSAN is FICON VSAN in any selected switch, the following fields will not appear
on the UI, as they cannot be modified for the FICON VSAN.
• Loadbalancing
• InterOp
• InorderDelivery
After modify the attributes, you can click Apply to save changes or Cancel to discard.
Switch Name Displays the name of the switch associated with the VSAN.
Name Displays the name of the VSAN.
Admin Specifies if the status of the Admin is either Active or Suspend.
• active implies that the VSAN is configured and services for the VSAN is activated.
• suspended implies that the VSAN is configured; however, the services for the VSAN
is deactivated. You can use set this state to preconfigure all the VSAN parameters by
using the CLI only.
Note If you suspend a VSAN, it will be removed from Cisco DCNM as well.
Field Description
LoadBalancing Specifies the load balancing type used in the VSAN.
The type of load balancing used on this VSAN.
• srcId/DestId— use source and destination ID for path selection
• srcdId/DestId/0xld— use source, destination, and exchange IDs
InorderDelivery The InorderDelivery guarantee flag of device. If true, then the inorder delivery is guaranteed.
If false, it is not guaranteed.
FICON True if the VSAN is FICON-enabled.
Icons
Total The number next to Table specifies the entries under this tab.
Refresh Icon Click on the Refresh icon to refresh the entries.
Domain ID tab
This tab displays information about the VSAN domain and its parameters. The following table describes the
fields that appear on the Domain ID tab.
Field Description
Edit Click Edit icon to modify the Domain ID information for the selected switch.
Switch Specifies the switch name in the VSAN.
Name
Note NPV switches are not listed in this column. However, the NPV switches exist in
this VSAN fabric.
Field Description
Refresh Click on the Refresh icon to refresh the entries.
Icon
Field Description
Edit Click Edit icon to modify Port VSAN Membership for selected VSAN and selected switch.
Port VSAN Membership will be presented by different types including FC ( physical ),
PortChannel, FCIP, iSCSI, VFC ( slot/port ), VFC(ID), VFC(Channel), VFC FEX and VFC
Breakout, PortChooser button is provided for each type to show all existing interfaces on a
selected switch for user to choose from.
Note If you modify Post VSAN Membership for any operational trunking port or port
channel members, a warning appears. You must use Device Manager to change
Allowed VSAN List for Trunking Interface.
SAN Zoning
Zoning enables you to set up access control between storage devices or user groups. If you have administrator
privileges in your fabric, you can create zones to increase the network security and to prevent data loss or
corruption. Zoning is enforced by examining the source-destination ID field.
The following table describes the fields and icons that appear on Cisco DCNM Configure > SAN > Zoning
tab.
Field Description
Fabric From the Fabric drop-down list, you can choose the
fabric for which you are configuring or viewing the
SAN Zoning.
VSAN From the VSAN drop-down list, you can choose the
VSAN for which you are configuring zoning.
Field Description
Zones Lists all the Zones that are configured under the
selected Zoneset.
Clear Server Cache Clears the cache on the Cisco DCNM server.
Procedure
Step 1 Choose Dashboard > Network, and select a switch in the Device Name column. Alternatively, you can
choose Inventory > View > Switches.
Step 2 Click License in the switch dashboard.
Step 3 Click Install to install the switch license file on a switch.
A Switch License Install window appears.
Step 4 Click Select License File, and select the license file from your local system.
Step 5 Select the transport method. The available options are:
• TFTP
• SCP
• SFTP
Step 6 Enter the username and password to connect to the DCNM server.
Step 7 Click Install.
Zones
Based on the Zoneset selected, the zones configured under that zoneset are displayed in the Zones area. It
will also display true or false only when the VSAN has smart zone enabled. You can create, copy, delete or
edit the zones. Furthermore, the zones can be added to or removed from the selected Zoneset. You can also
enable or disable smart zone on the zone table.
Note You must select the Zoneset for which you need to alter the zones.
Select Zoneset radio button in the Zonesets area. The zones configured on the selected Zoneset and zones on
the switch are displayed. The zones that are a part of the Zone are marked with a green check mark.
The Zones area has the following fields and their descriptions.
Field Description
Procedure
Step 1 To create zones, from Cisco DCNM Web Client > Configure > SAN > Zoning > Zones, click Create icon.
a) In the Create Zone window, enter a valid name for the zone, and click Create.
A zone is created and is listed in the Zones area.
Step 2 To Clone Zones, from Cisco DCNM Web Client > Configure > SAN > Zoning > Zones, select the zone
radio button and click Clone Zone icon.
The Clone Zone screen appears.
a) In the Name field, enter a valid name for the new zoneset.
b) Click Clone to clone the zone.
The cloned zones appear in the Zones area.
Step 3 To add zone to a zoneset, from Cisco DCNM Web Client > Configure > SAN Zoning > Zones, select the
zone that is not a part of the zoneset and click Add Zone icon. You can select more than one zone to be added
to the Zoneset.
The zone will be added to the selected Zoneset. A green tick mark appears next to the Zone name to indicate
that the zone is added to the zoneset.
Step 4 To remove zone from a zoneset, from Cisco DCNM Web Client > Configure > SAN Zoning > Zones, check
the zone check box and click Remove Zone icon. You can select more than one Zone to be deleted from the
Zoneset.
The zone will be removed from the selected Zoneset. A green tick mark disappears next to the Zone name to
indicate that the zone is removed from the zoneset.
Step 5 To Delete Zones, from Cisco DCNM Web Client > Configure > SAN Zoning > Zones, check zone check
box and click Delete Zone icon.
A confirmation window appears.
Click Yes to delete the selected zones.
Note You cannot delete a zone that is a member of the selected zoneset. You must remove the zone from
the zoneset to delete it.
Step 6 To edit the zone name, from Cisco DCNM Web Client > Configure > SAN Zoning > Zones, select the zone
radio button and click Rename Zone icon.
In the Name field, enter the new name for the zone.
Click Rename.
Step 7 To enable smart zone, from Cisco DCNM Web Client > Configure > SAN Zoning > Zones, select the zone
radio button and click Enable Smart Zone icon.
Under the Smart Zone column, it will display True.
Step 8 To disable smart zone, from Cisco DCNM Web Client > Configure > SAN Zoning > Zones, select the zone
radio button and click Disable Smart Zone icon.
Under the Smart Zone column, it will display false.
Zone Members
Based on the selected Zoneset and the Zone, the Zone Members area displays the zone members and their
status. You can create, or remove members from the Zoneset.
The Zone Members area has the following fields and their descriptions.
Field Description
Field Description
You can search by zone name in this field.
Switch Interface Specifies the switch interface that the zone member
is attached to.
You can search by specifying the switch interface.
Procedure
Step 1 To create zone members, from Cisco DCNM Web Client > Configure > SAN Zoning > Zone Members,
click Create icon.
a) In the Create and Add Member window, enter the WWN name for the zone member.
b) Click Create and Add.
Add Members to Zones window pops out, you can specify the smart zoning device type as Host, Storage
or Both(Host and Storage). A zone member is created and is listed in the Zone Member area.
The Create and Add feature allows you to add a member to a zone that does not exist in the fabric, currently.
This feature can also be utilized when the device discovery did not discover all the devices. With the Available
to add feature, you can add a discovered device to the zone.
Step 2 To Remove Zone Member, from Cisco DCNM Web Client > Configure > SAN Zoning > Zone Members,
check the zone member check box and click Remove Member icon.
You can more than one zone member at a time, for deletion.
Available to Add
Perform the following task to add discovered devices to the zone(s).
The Available to Add area has the following fields and their descriptions.
Field Description
Switch Interface Specifies the switch interface that the zone member
is attached to.
You can search by specifying the switch interface.
Procedure
Step 1 From Cisco DCNM Web Client > Configure > SAN > Zoning > Available to Add, in the Zone by area
select the Ports or Device radio buttons.
The Zone by feature determines if the device must be added to the zone using the device WWN or Device
alias.
A window appears showing the list of End Ports or Devices available to add.
If you choose Zone By: End Port, the devices are added to the zones by WWN. If you choose Zone By:
Device Alias, the devices are added to the zones by Device Alias. Based on the zone by option you choose,
the devices are displayed.
Note You can select more than one zone. When this occurs, a dialog appears that shows a list of all the
zones that are currently selected on the zone table.
IVR Zoning
From Cisco DCNM Release 11.0(1), IVR Zoning feature is supported. You can use IVR Zoning to create,
edit, copy, or delete IVR zones in the web client.
The IVR Zoning page is launched from Cisco DCNM Configure > SAN > IVR Zoning menu item. After
you launch the IVR Zoning page, you will see the following fields and sections:
• Fabric
• Region ID
• Switches
• Commit Changes
• Export All
• Clear Server Cache
• Discard Pending Changes
• Zonesets
• Zone Members
• Zones
• Available to Add
The following table describes the fields and icons on Cisco DCNM Configure > SAN > IVR Zoning tab.
Field Description
Fabric From the Fabric drop-down list, you can choose the
fabric for which you are configuring or viewing the
IVR Zoning. You must select a fabric to view the
options of Region ID and Switches.
Field Description
Clear Server Cache Clears the discovered zoning cache on the Cisco
DCNM server.
To display the zone sets, you need to select the desired fabric, region ID, and switch. This is different from
regular zoning, which needs the fabric, VSAN, and switch.
Three checks are made when a switch is selected and can result in a warning dialog including one or more of
the following warnings:
• Check for IVR Cisco Fabric Services enabled.
• Check for NAT and Auto Topology Enabled.
• Check if there is an existing IVR zone merge failure.
If the IVR Cisco Fabric Services feature is not enabled, then Activate, Deactivate, Commit Changes, and
Discard Pending Changesare blocked. If IVR NAT and IVR Auto Topology are not enabled, you will get
a warning to enable them.
This section contains the following:
Zonesets
Based on the selected fabric, region and switch, the Zoneset area displays the configured zonesets and their
status. You can create, copy or clone, delete, rename, activate, or deactivate a zoneset.
The following table describes the fields and icons that appear on Cisco DCNM Web Client > Configure >
SAN > IVR Zoning > Zonesets area:
Fields Description
Fields Description
Procedure
Step 1 To create zonesets, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zonesets, click
Create Zoneset icon.
a) In the Create Zoneset window, enter a valid name for the zoneset.
b) Click Create.
A zoneset is created and is listed in the Zoneset area.
Step 2 To clone or copy zonesets, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zonesets,
select the radio button of the zoneset to be copied or cloned, and click Clone\Copy Zoneset icon.
The Clone\Copy Zoneset window shows two options.
a) Click the appropriate Action radio button.
You can choose one of the following:
• Copy—You can prepend or append a string to identify the copied zoneset. Enter a valid string in the
Tag field, and select the Prepend or Append radio button.
• Clone—In the Name field, enter a valid name for the new zoneset.
Step 3 To delete the zoneset, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zoneset, select
the zoneset radio button and click Delete Zoneset icon.
A confirmation window appears.
Click Yes to delete the zoneset.
Step 4 To rename the zonset name, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zonesets,
select the zoneset radio button and click Rename Zoneset icon.
In the Name field, enter the new name for the zoneset.
Click Rename.
Step 5 To activate a zoneset, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zonesets, select
the zoneset radio button and click Activate.
The Zoneset Differences window shows the changes made to the zoneset since it was activated previously.
Click Activate.
Step 6 To deactivate a zoneset, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zonesets,
select the zoneset radio button and click Deactivate.
A confirmation window appears.
Zones
All zones configured appear under Zones when a zoneset is selected. The zones that belong to the selected
zoneset have a green check box. You can create, copy, delete, or edit zones. Furthermore, the zones can be
added to or removed from the selected zoneset. You can also enable or disable smart zone on the zone table.
The following table describes the fields and icons that appear on Cisco DCNM Configure > SAN > IVR
Zoning > Zones:
Fields Description
Clone Zone Creates a zone with a new name consisting the same
zone members as the source zone.
Procedure
Step 1 To create a zone, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zones, click Create
Zone.
a) In the Create Zone window, enter a valid name for the zone.
b) Click Create.
A zone is created and is listed in the Zones area.
Step 2 To clone a zone, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zonesets, select a
zoneset.
All the zones in the fabric will appear under Zones. From Zones, select a zone and click Clone Zone.
Note You can clone only one zone at a time.
a) In the Clone Zone window, enter a valid name for the new zone.
b) Click Clone.
The cloned zones appear under Zones.
Step 3 To add a zone that is not part of a zoneset, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning
> Zonesets, select a zoneset.
All the zones in the fabric will appear under Zones. From Zones, select a zone that is not part of the zoneset
and click Add Zone icon.
You can select more than one zone to be added to the zoneset.
The zone will be added to the selected zoneset. A green check mark appears next to the zone name to indicate
that the zone is added to the zoneset.
Step 4 To remove a zone from a zoneset, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning >
Zonesets, select a zoneset.
All the zones in the fabric will appear under Zones. From Zones, select a zone that belongs to the selected
zoneset and click Remove Zone.
The zone will be removed from the selected zoneset. The green check mark next to the zone name disappears
to indicate that the zone is removed from the zoneset.
Step 5 To delete a zone from a zoneset, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning >
Zonesets, select a zoneset.
All the zones in the fabric will appear under Zones. From Zones, select a zone that does not belong to the
selected zoneset and click Delete Zone.
A confirmation window will appear. Click Yes to delete the selected zones.
Note You cannot delete a zone that is a member of the selected zoneset. You must remove the zone from
the zoneset to delete it.
Step 6 To rename a zone, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zonesets, select a
zoneset. From Zones, select the zone to be renamed and click Rename Zone.
In the Name field, enter the new name for the zone.
Click Rename.
Step 7 To enable a smart zone, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zonesets,
select a zoneset.
From Zones, select a zone, and click Enable Smart Zone.
Under the Smart Zone column, it will display True.
Step 8 To disable a smart zone, from Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Zonesets,
select a zoneset.
From Zones, select a zone, and click Disable Smart Zone.
Under the Smart Zone column, it will display False.
Zone Members
Based on the selected zoneset and zone, the Zone Members area displays the zone members and their status.
You can add or remove members from the zoneset.
The following table describes the fields and icons that appear on Cisco DCNM Configure > SAN > IVR
Zoning > Zone Members area:
Field Description
Create and Add Member to Zone Creates a zone member and adds it to a zone.
Remove Member Removes a zone member. You can remove more than
one member at a time.
Switch Interface Specifies the switch interface that the zone member
is attached to.
You can search by specifying the switch interface.
Procedure
Step 1 To create and add zone members, from Cisco DCNM Configure > SAN > IVR Zoning > Zone Members
click Create and Add Member to Zone.
a) In the Create and Add Member window, enter the WWN name and VSAN for the zone member.
You can enter the WWN name with or without colons.
b) Click Create and Add.
The Create and Add feature allows you to add a member to a zone that does not exist in the fabric, currently.
This feature can also be utilized when the device discovery did not discover all the devices. With the Available
to add feature, you can add a discovered device to the zone.
Step 2 To remove a zone member, from Cisco DCNM Configure > SAN > IVR Zoning > Zone Members, select
a zone member and click Remove Member.
Available to Add
You can add discovered devices to the zones using Available to Add option. The Add Member dialog has
an additional field for VSAN to be entered, which is only visible when launched from the IVR Zoning page
and not the regular Zoning page.
The following table describes the fields and icons that appear on Cisco DCNM Configure > SAN > IVR
Zoning > Available to Add:
Field Description
Switch Interface Specifies the switch interface that the zone member
is attached to.
You can search by specifying the switch interface.
Field Description
Procedure
Step 1 From Cisco DCNM Web Client > Configure > SAN > IVR Zoning > Available to Add, in the Zone by
field select End Ports or Device Alias radio button.
A window appears showing the list of end ports or devices available to add.
Configuring FCIP
Cisco DCNM allows you to create FCIP links between Gigabit Ethernet ports, enables Fibre Channel write
acceleration and IP compression. You can configure FCIP from Cisco DCNM Web Client > SAN > FCIP.
Procedure
Step 1 From the menu bar, select Configure > SAN > FCIP.
The Welcome page displays the tasks to configure FCIP using the FCIP Wizard.
Down ports should be enabled to function correctly. Security can be enforced for unconfigured 14+2, 18+4,
9250i and SSN16 Ethernet ports.
• Enable Optimum Compression—Check the check box to enable the optimum compression.
• Enable XRC Emulator—Check the check box to enable XRC emulator.
• Connections—Enter the number of connections from 0 to 100.
Step 13 Click Deploy to configure FCIP or click Finish complete the configuration and deploy later.
Port Channels
Port Channels refer to the aggregation of multiple physical interfaces into one logical interface to provide
higher aggregated bandwidth, load balancing, and link redundancy. Port Channels can connect to interfaces
across switching modules, so a failure of a switching module cannot bring down the Port Channel link.
Beginning with Cisco Data Center Network Manager 11.0(1), you can configure and edit Port Channels.
Navigate to Configure > SAN > Port Channel to create or edit Port Channels.
Click Create New Port Channel to launch the wizard to create new Port Channel.
Click Edit Existing Port Channel to launch the wizard to edit an existing Port Channel.
Port Channels on Cisco MDS 9000 Family switches allow flexibility in configuration. This illustrates three
possible Port Channel configurations:
• Port Channel A aggregates two links on two interfaces on the same switching module at each end of a
connection.
• Port Channel B also aggregates two links, but each link is connected to a different switching module. If
the switching module goes down, traffic is not affected.
• Port Channel C aggregates three links. Two links are on the same switching module at each end, while
one is connected to a different switching module on switch 2.
Load Balancing
Two methods support the load-balancing functionality:
• Flow-based—All frames between a source and destination follow the same links for a given flow. That
is, whichever link is selected for the first exchange of the flow is used for all subsequent exchanges.
• Exchange-based—The first frame in an exchange picks a link and subsequent frames in the exchange
follow the same link. However, subsequent exchanges can use a different link. This provides more
granular load balancing while preserving the order of frames for each exchange.
The following figure illustrates how a source ID 1 (SID1) and destination ID1 (DID1)-based load balancing
works. When the first frame in a flow is received on an interface for forwarding, link 1 is selected. Each
subsequent frame in that flow is sent over the same link. No frame in SID1 and DID1 utilizes link 2.
Figure 7: SID1 and DID1-Based Load Balancing – 79530.ps
The following figure illustrates how exchange-based load balancing works. When the first frame in an exchange
is received for forwarding on an interface, link 1 is chosen by a hash algorithm. All remaining frames in that
particular exchange are sent on the same link. For exchange 1, no frame uses link 2. For the next exchange,
link 2 is chosen by the hash algorithm. Now all frames in exchange 2 use link 2.
Figure 8: SID1, DID1, and Exchange-Based Load Balancing – 79531.ps
• ACTIVE—The member ports initiate Port Channel protocol negotiation with the peer ports regardless
of the channel group mode of the peer port. If the peer port, while configured in a channel group, does
not support the Port Channel protocol, or responds with a nonnegotiable status, it defaults to the ON
mode behavior. The ACTIVE Port Channel mode allows automatic recovery without explicitly enabling
and disabling the Port Channel member ports at either end.
Channel increases the channel size and bandwidth of the Port Channel. Removing an interface from a Port
Channel decreases the channel size and bandwidth of the Port Channel.
This section describes interface configuration for a Port Channel and includes the following topics:
After the members are added, regardless of the mode (ACTIVE and ON) used, the ports at either end are
gracefully brought down, indicating that no frames are lost when the interface is going down (see the
“Generation 1 Port Channel Limitations” section on page -12).
Compatibility Check
A compatibility check ensures that the same parameter settings are used in all physical ports in the channel.
Otherwise, they cannot become part of a Port Channel. The compatibility check is performed before a port is
added to the Port Channel.
The check ensures that the following parameters and settings match at both ends of a Port Channel:
• Capability parameters (type of interface, Gigabit Ethernet at both ends, or Fibre Channel at both ends).
• Administrative compatibility parameters (speed, mode, rate mode, port VSAN, allowed VSAN list, and
port security).
Note Ports in shared rate mode cannot form a Port Channel or a trunking Port Channel.
A port addition procedure fails if the capability and administrative parameters in the remote switch are
incompatible with the capability and administrative parameters in the local switch. If the compatibility check
is successful, the interfaces are operational and the corresponding compatibility parameter settings apply to
these interfaces.
Note When Port Channels are created from within an interface, the force option cannot be used.
After the members are forcefully added, regardless of the mode (ACTIVE and ON) used, the ports at either
end are gracefully brought down, indicating that no frames are lost when the interface is going down.
After the members are deleted, regardless of the mode (ACTIVE and ON) used, the ports at either end are
gracefully brought down, indicating that no frames are lost when the interface is going down.
information that is received from the peer ports along with its local configuration and operational values to
decide if it should be part of a Port Channel. The protocol ensures that a set of ports is eligible to be part of
the same Port Channel. They are only eligible to be part of the same Port Channel if all the ports have a
compatible partner.
The Port Channel protocol uses two subprotocols:
• Bringup protocol—Automatically detects misconfigurations so you can correct them. This protocol
synchronizes the Port Channel at both ends so that all frames for a given flow (as identified by the source
FC ID, destination FC ID and OX_ID) are carried over the same physical link in both directions. This
helps make applications such as write acceleration, work for Port Channels over FCIP links.
• Autocreation protocol—Automatically aggregates compatible ports into a Port Channel.
This section describes how to configure the Port Channel protocol and includes the following sections:
Note Channel groups are not supported on internal ports in the Cisco Fabric Switch for HP c-Class BladeSystem
and the Cisco Fabric Switch for IBM BladeSystem.
Assuming link A1-B1 comes up first (see Figure 1-9), that link is operational as an individual link. When the
next link comes up, for example, A2-B2, the Port Channel protocol identifies if this link is compatible with
link A1-B1 and automatically creates channel groups 10 and 20 in the respective switches. If link A3-B3 can
join the channel groups (the Port Channels), the respective ports have compatible configurations. If link A4-B4
operates as an individual link, it is because of the incompatible configuration of the two end ports with the
other member ports in this channel group.
Figure 9: Autocreating Channel Groups – 120489.ps
The channel group numbers are selected dynamically, and as such, the administrative configuration of the
ports forming the channel group at either end are applicable to the newly created channel group. The channel
group number being chosen dynamically may be different across reboots for the same set of Port Channels
based on the order of ports that are initialized in the switch.
Table 1-10 identifies the differences between user-configured and auto-configured channel groups.
Any administrative configuration that is made to Any administrative configuration that is made to the Port
the Port Channel is applied to all ports in the Channel is applied to all ports in the channel group, but
channel group, and you can save the the configurations are saved for the member ports; no
configuration for the Port Channel interface. configuration is saved for the Port Channel interface. You
can explicitly convert this channel group, if required.
You can remove any channel group and add You cannot remove a channel group, or add/remove any
members to a channel group. of its members. The channel group is removed when no
member ports exist.
Autocreation
The autocreation protocol has the following functionality:
• A port is not allowed to be configured as part of a Port Channel when the autocreation feature is enabled.
These two configurations are mutually exclusive.
• Autocreation must be enabled in both the local and peer ports to negotiate a Port Channel.
• Aggregation occurs in one of two ways:
• A port is aggregated into a compatible autocreated Port Channel.
• A port is aggregated with another compatible port to form a new Port Channel.
• Newly created Port Channels are allocated from the maximum Port Channel (128 for Generation 1 or a
combination of Generation 1 and Generation 2 switches, or 256 for Generation 2 switches) in a decreasing
order based on availability. If all 128 (or 256) numbers are used up, aggregation is not allowed.
• You cannot change the membership or delete an autocreated Port Channel.
• When you disable autocreation, all member ports are removed from the autocreated Port Channel.
• Once the last member is removed from an autocreated Port Channel, the channel is automatically deleted
and the number is released for reuse.
• An autocreated Port Channel is not persistent through a reboot. An autocreated Port Channel can be
manually configured to appear the same as a persistent Port Channel. Once the Port Channel is made
persistent, the autocreation feature is disabled in all member ports.
• You can enable or disable the autocreation feature on a per-port basis or for all ports in the switch. When
this configuration is enabled, the channel group mode is assumed to be active. The default for this task
is disabled.
• If autocreation of channel groups is enabled for an interface, you must first disable autocreation before
downgrading to earlier software versions or before configuring the interface in a manually configured
channel group.
Note When enabling autocreation in any switch in the Cisco MDS 9000 Family, we recommend that you retain at
least one interconnected port between the switches without any autocreation configuration. If all ports between
two switches are configured with the autocreation feature at the same time, you may face a possible traffic
disruption between these two switches as the ports are automatically disabled and reenabled when ports are
added to an autocreated Port Channel.
Tip If you enable persistence, be sure to enable it at both ends of the Port Channel.
If all three conditions are not met, the faulty link is disabled.
Enter the show interface command for that interface to verify that the Port Channel is functioning as required.
When configuring the host-optimized ports on Generation 1 hardware, the following Port Channel guidelines
apply:
• If you execute the write erase command on a 32-port switching module, and then copy a saved
configuration to the switch from a text file that contains the no system default switchport shutdown
command, you have to copy the text file to the switch again for the E ports to come up without manual
configuration.
• Any (or all) full line rate ports in the Cisco MDS 9100 Series can be included in a Port Channel.
• The host-optimized ports in the Cisco MDS 9100 Series are subject to the same Port Channel rules as
32-port switching modules; only the first port of each group of four ports is included in a Port Channel.
• You can configure only the first port in each 4-port group as an E port (for example, the first port
in ports 1–4, the fifth port in ports 5–8, and so on). If the first port in the group is configured as a
Port Channel, the other three ports in each group (ports 2–4, 6–8, and so on) are not usable and
remain in the shutdown state.
• If any of the other three ports are configured in a no shutdown state, you cannot configure the first
port to be a Port Channel. The other three ports continue to remain in a no shutdown state.
• Port security rules are enforced only on physical pWWNs at the single link level.
• FC-SP authenticates only the first physical FLOGI of every Port Channel member.
• Since the FLOGI payload carries only the VF bits to trigger the use of a protocol after the FLOGI
exchange, those bits will be overridden. In the case of the NPV switches, the core has a Cisco WWN
and tries to initiate the PCP protocol.
• The name server registration of the N ports logging in through an F Port Channel uses the fWWN of the
Port Channel interface.
• DPVM configuration is not supported.
• The Port Channel port VSAN cannot be configured using DPVM.
• The Dynamic Port VSAN Management (DPVM) database is queried only for the first physical FLOGI
of each member, so that the port VSAN can be configured automatically.
• DPVM does not bind FC_IDs to VSANs, but pWWNs to VSANs. It is queried only for the physical
FLOGI.
The following figure provides examples of invalid configurations. Assuming that the links are brought up in
the 1, 2, 3, 4 sequence, links 3 and 4 will be operationally down as the fabric is misconfigured.
Figure 11: Misconfigured Configurations – 120488.ps
Default Settings
The following table lists the default settings for Port Channels.
Parameters Default
Port Channels FSPF is enabled by default.
Create Port Channel Administratively up.
Default Port Channel ON mode on non-NPV and NPIV core switches.
mode
ACTIVE mode on NPV switches.
Autocreation Disabled.
Procedure
Step 2 In the Select Switch Pair screen, perform the following steps:
a) Select the appropriate fabric from the Fabric drop-down.
The list contains switch pairs in the fabric that have an ISL between them, that is not already in a port
channel.
b) Select a switch pair to be linked by an FC Port Channel.
If there are NPV links between NPIV-core and NPV switches, you must enable F Port Trunking and
Channeling Protocol using the feature fport-channel-trunk command on the NPIV switch in order to
see the switch-pair and the number of NPV links.
c) Click Next.
Step 3 In the Select ISLs screen, select one or more ISLs or Links to create a new Channel between the switch pair.
a) From the list of ISLs in the Available area, select and click right arrow to move the ISL to the Selected
area.
b) Click Next.
Step 4 In the Create Port Channel screen, define, or edit the channel attributes.
a) Channel ID field is populated with the next unused channel ID. Change the channel ID or description for
each switch, if necessary.
The range of the channel ID is from 1 to 256.
b) FICON Port Address is only enabled if the switches are FICON enabled. From the drop-down list, select
the appropriate FICON port address on the switch. Select the port address that you want to assign to the
Port Channel port.
c) In the Channel Attributes area, to configure the speed, click the appropriate radio button.
d) Select the appropriate Trunk Mode radio button to enable trunking on the links in the Port Channel.
• Select trunk if your link is between TE ports.
• Select nonTrunk if your link is between E ports.
• Select auto if you are not sure.
e) In the Port VSAN field, enter the interface ID for port VSAN which must be used when trunking is not
enabled.
Every interface must have a port VSAN even if trunking is enabled. If trunking is enabled, this port VSAN
is not used. However, the switch must configure the port, so that the network knows what VSAN to use
by default, if trunking is disabled.
f) VSAN list field provides a list of VSANs you want to allow the port channel to use for trunking.
This field is disabled if the Trunk Mode is set to nonTrunk or auto.
g) In the Core Switch Bandwidth field, select dedicated or shared radio button to allocate the switch bandwidth.
This bandwidth is applicable only for port channels between an NPIV and NPV switch.
h) Check the Force Admin, Trunk, Speed, and VSAN attributes to be identical checkbox to ensure that
the same parameter settings are used in all physical ports in the channel. If these settings are not identical,
the ports cannot become part of the Port Channel.
Step 5 Click Previous to return to the previous screen and edit the settings. Click Finish to configure the Port Channel.
A success message appears.
Procedure
Step 2 In the Select Switch Pair screen, perform the following steps:
a) Select the appropriate fabric from the Fabric drop-down list.
The switch pairs that have port channels between them is displayed.
b) Select a switch pair to edit the port channel.
c) Click Next.
Step 3 In the Select Port Channel screen, select a Port Channel to edit.
Click Next.
Step 4 In the Edit Port Channel screen, select the desired ISL.
a) Click the right and left arrow to select the available ISLs.
Note The selected ISLs are contained in the Port Channel after you save the changes. If the Selected
ISLs list is empty, the Delete Port Channel is Empty checkbox is enabled.
b) If you do not choose any ISL, check the Delete Port Channel if Empty checkbox to delete the port
channel.
c) Check the Force admin, trunk, speed, VSAN attributes to be identical checkbox to choose identical
values for admin, trunk, speed, and VSAN attributes.
d) Click Next.
Step 5 Click Finish to apply the changes.
Click Previous to go back to the previous screen and edit the values.
Click Cancel to discard the changes.
Device Alias
A device alias is a user-friendly name for a port WWN. Device alias name can be specified when configuring
features such as zoning, QoS, and port security. The device alias application uses the Cisco Fabric Services
(CFS) infrastructure to enable efficient database management and fabric-wide distribution.
This section contains context-sensitive online help content under Configure > SAN > Device Alias.
The following table describes the fields that appear under Configure > SAN > Device Alias.
Field Description
Device Alias Displays the alias retrieved from the seed switch.
Configuration
Select the Fabric from the Fabric drop-down list. The list of device aliases existing on the fabric will be
retrieved and displayed.
Before performing any Device Alias configuration, check the status on the CFS tab, to ensure that the status
is "success".
Note To perform Device Alias configuration from the Cisco DCNM Web client, the fabric must be configured as
Device Alias enhanced mode.
Procedure
Step 1 To delete the device alias, Cisco DCNM Web Client > Configure > SAN > Device Alias > Configuration
tab, check the device alias you need to delete.
a) Click Delete.
A confirmation message appears.
Note Deleting the device alias may cause traffic interruption.
Step 3 For end devices with an attached service profile, the service profile name is populated to the Device Alias
field. This allows the service profile name as device alias name for those devices.
Device Alias creation is CFS auto-committed after clicking Apply. Click CFS tab to check if CFS is properly
performed after the device alias was created. In case of failure, you must troubleshoot and fix the problem.
CFS
Select the Fabric from the Fabric drop-down list. The list of device aliases existing on the fabric will be
retrieved and displayed.
CFS information is listed for all the eligible switches in the fabric. Before performing any Device Alias
configuration, check the status on the CFS tab, to ensure that the status is "success". If the CFS is locked by
another user, or if the previous operation failed, ensure that the CFS session is unlocked.
The Cisco DCNM Web Client Configure > SAN > Device Alias > CFS tab shows the following fields.
Procedure
Step 1 To commit the CFS configuration, from Cisco DCNM Web Client > Configure > SAN > Device Alias >
CFS tab, click the Switch radio button.
Click Commit.
The CFS configuration for this switch is committed.
Step 2 To abort the CFS configuration, from Cisco DCNM Web Client > Configure > SAN > Device Alias > CFS
tab, click the Switch radio button.
Click Abort.
The CFS configuration for this switch will be aborted.
Step 3 To clear the lock on the CFS configuration of the switch, from Cisco DCNM Web Client > Configure >
SAN > Device Alias > CFS tab, click the Switch radio button.
Click Clear Lock.
If the CFS is locked by another user, or if the previous operation failed, ensure that the CFS session is unlocked.
Port Monitoring
This feature allows you to save custom Port Monitoring policies in the Cisco DCNM database. It allows you
to push the selected custom policy to one or more fabrics or Cisco MDS 9000 Series Switches. The policy is
designated as active Port-Monitor policy in the switch.
This feature is supported only on the Cisco MDS 9000 SAN Switches and therefore the Cisco DCNM user
is allowed to select the MDS switch to push the policy.
Cisco DCNM provides five templates to customize the policy. The user-defined policies are saved in the Cisco
DCNM database. You can select any template or customized policy to push to the selected fabric or switch
with the desired port type.
The following table describes the fields that appear on Cisco DCNM Configure > SAN > Port Monitoring.
Field Description
Field Description
Note The port type of the customized policy will
not be saved when Save As is selected.
Push to switches Allows you to select a fabric or switch and push the
selected policies with a desired port type.
The available port types are:
• trunks/Core
• access-port/Edge
• all
Field Description
the existing active policy with the same or common
port type.
If you click Push to Switches while the policy is
edited, the customized policy will not be saved.
Rising Threshold Specifies the upper threshold limit for the counter
type.
Falling Threshold Specifies the lower threshold limit for the counter
type.
Poll Interval Specifies the time interval to poll for the counter
value.
SAN Insights
The SAN Insights feature enables you to configure, monitor, and view the flow analytics in fabrics. Cisco
DCNM enables you to visually see health-related indicators in the interface so that you can quickly identify
issues in fabrics. Also, the health indicators enable you to understand the problems in fabrics. The SAN
Insights feature also provides more comprehensive end-to-end flow-based data from host to LUN.
Prerequisites
• The SAN Insights feature is supported for Cisco MDS NX-OS Release 8.3(1) and later.
For information about the SAN Insights dashboard, see SAN Insights Dashboard.
For information about monitoring SAN Insights, see Monitoring Insights Flows.
For information about configuring SAN Insights dashboard, see Configuring SAN Insights.
Step 1 To configure the SAN Insights feature, choose Configure > SAN > SAN Insights. The Configure SAN
Insights wizard appears.
Step 3 Select a fabric. The wizard works with one fabric at a time.
Note Both Cisco DCNM and switch time are captured and displayed when you navigate to the Select
Switches page. This helps you to ensure that the clocks of Cisco DCNM and switch are in sync.
Step 6 In the Install Query column, choose one type of port per switch, and then click Save. You can choose from
these options: ISL, host, or storage.
• host—lists all ports where hosts/initiators are connected on the switch
• storage—lists all ports where storage/targets are connected on the switch
• ISL—lists all ISL and port-channel ISL ports on the switch
When the administrator selects the ISL/Host/Storage on the configure wizard, the respective ports are filtered
and listed on the next step.
Step 7 Click Continue. You can see current status of analytics enabled/disabled on the host/storage/ISL interfaces
based on the selection made in the preceding step.
Step 8 Choose the switch interfaces that generate insights data within the fabric.
You can click the toggle button to enable/disable analytics on the desired port.
Step 9 Click Continue.
On the configure wizard, thee queries are pushed to the Cisco MDS switches. The query names and description
are:
Step 12 Review the results and see that the response is successful.
Step 13 Click the Close button to return to the home page. The Close button appears only after all CLI commands are
executed on the switch.
If you want to make any changes to the SAN Insights configurations, you can navigate to the SAN Insights
page and make necessary configuration changes.
DCNM Server
The DCNM Server menu includes the following submenus:
Step 2 In the Actions column, use the Start or Stop icons to start or stop services, or the Delete icon to clean up PM
DB stale entries. You can see the latest status in the Status column.
What to do next
Using the Commands Table
The commands table contains links to commands that will launch new dialog boxes to provide information
about the server status and server administrative utility scripts. These can be directly executed on the server
CLI as well.
• ifconfig—click this link to view information about interface parameters, IP address and netmask used
on the Cisco DCNM server.
• appmgr status all—click this link to view the DCNM server administrative utility script that checks the
status of different services currently running.
• clock—click this link to view information about the server clock details such as time, zone information.
Note The commands section is applicable only for the OVA/ISO installations.
To view the logs from the Cisco DCNM Web UI, perform the following steps:
Procedure
Step 2 Click a log file under each node of the tree to view it in the right column.
Step 3 Double-click the tree node for each server to download a zip file containing those log files from that server.
Step 4 Click the Print icon on the upper right corner of the right column to print the logs page.
Server Properties
This page allows you to set common parameters, which are populated as default values in the DCNM server.
Specify the parameters in the following fields according to the corresponding description.
Procedure
Procedure
Step 1 From the menu bar, choose Administration > DCNM Server > Archive FTP Credentials.
You will see Archive FTP Credentials page.
Note The credentials are auto-populated for fresh OVA and ISO installations.
Step 2 In the Server Type field, use the radio button to select SFTP.
Note • You must have an SFTP server to perform backup operation. The SFTP server can be an
external server. The SFTP directory must be an absolute Linux/SSH path format and must have
read/write access to the SFTP User.
• If you are using an external server, enter its IP address in the server.FileServerAddress field
under Administration > DCNM Server > Server Properties.
• If the nat.enabled field under Administration > DCNM Server > Server Properties is true,
you must enter the NAT device IP in the server.FileServerAddress field and the SFTP server
must be local.
c) Click Verify & Apply to verify if TFTP and switch has connectivity and save the configuration. If there
are any failures during the verification, the new changes will not be stored.
Step 4 In the Server Type field, use the radio button to select SCP.
Note • You must have an SCP server to perform backup operation. The SCP server can be an external
server. The SCP directory must be an absolute Linux/SSH path format and must have read/write
access to the SCP User.
• If you are using an external server, enter its IP address in the server.FileServerAddress field
under Administration > DCNM Server > Server Properties.
• If the nat.enabled field under Administration > DCNM Server > Server Properties is true,
you must enter the NAT device IP in the server.FileServerAddress field and the server must
be local.
• If the path in the external SFTP is C://Users/test/sftp/, then the Cisco DCNM SFTP
Directory path must be /.
• If the path in the external SFTP is C://Users/test, then the Cisco DCNM SFTP Directory
path must be /sftp/.
Procedure
Step 1 Choose Administration > DCNM Server > Modular Device Support to view the patch details.
You see the DCNM Servers column on the left in the window and Modular Device support information
window on the right.
Step 2 You can view all the DCNM servers under the DCNM Servers window. It includes the list of patch installed
along with the version number, corresponding platforms supported, chassis supported, NX-OS version
supported, PID supported, backup directory and the last patch deployment time in the Modular Device
support information table.
What to do next
For more details about how to apply and rollback a patch, please go to http://www.cisco.com/go/dcnm for
more information.
Procedure
Step 1 From the menu bar, choose Administration > DCNM Server > Switch Groups.
Step 2 Click the Add icon, and the Add Group window appears that allows you to enter the name for the switch
group.
Step 3 Enter the name of the switch group and click Add to complete adding the switch group.
The switch group name validation and the maximum tree depth is 10. If you do not choose a parent group
before adding a new switch group, the new group is added on the top of the hierarchy
Procedure
Step 1 Choose the switch group or member(s) of a group that you want to remove.
Step 2 Click the Remove icon or press the Delete key on your keyboard.
A dialog box prompts you to confirm the deletion of the switch group or the member of the group.
Procedure
Procedure
Step 1 Choose Administration > DCNM Server > Custom Port Groups.
The Custom Port Groups window is displayed.
Procedure
Step 1 From the menu bar, choose Administration > DCNM Server > Custom Port Groups.
Step 2 In the User Defined Groups block, select the port group for which you need to add the switch and interfaces.
Step 3 In the Configurations block, click the Add Member icon.
The Port Configuration window appears for the selected custom port group.
Step 4 In the Switches tab, select the switch that you need to include in custom port group.
The list of available Interfaces appears.
Step 5 Select all the interfaces for which you need to check the performance.
Step 6 Click Submit.
The list of interfaces is added to the custom port group.
Procedure
Step 1 Choose Administration > DCNM Server > Custom Port Groups.
Step 2 In the User Defined Groups block, select the port group for which you need to add the switch and interfaces.
Step 3 In the Configuration clock, select the switch name and interface that must be deleted.
Step 4 In the User Defined Groups block, select the group for which you which must be deleted. Click Remove
Member.
A confirmation window appears.
Step 5 Click Yes to delete the member from the custom port group .
Procedure
Step 1 Choose Administration > DCNM Server > Custom Port Groups.
Step 2 In the User Defined Groups block, select the group which must be deleted. Click Remove.
A confirmation window appears.
Managing Licenses
This section includes the following topics:
License Assignments
The following table displays the License Assignments for every switch.
Field Description
License State Displays the license state of the switch that can be one of the following:
• Permanent
• Eval
• Unlicensed
• Not Applicable
• Expired
• Invalid
Assign License Select a row and click this option on the toolbar to assign the license.
Unassign License Select a row and click this option on the toolbar to unassign the license.
Assign All Click this option on the toolbar to refresh the table and assign the licenses for
all the items in the table.
Unassign All Click this option on the toolbar to refresh the table and unassign all the
licenses.
Field Description
SAN (Free/Total) Displays the number of free versus total licenses for SAN.
LAN (Free/Total) Displays the number of free versus total licenses for LAN.
Procedure
Step 1 Choose Administration > DCNM Server > License to start the license wizard.
Step 2 Choose the Server License Files tab.
The valid Cisco DCNM-LAN and DCNM-SAN license files are displayed.
Ensure that the security agent is disabled when you load licenses.
Step 3 Download the license pack file that you received from Cisco into a directory on the local system.
Step 4 Click Add License File and then select the license pack file that you saved on the local machine.
The file is uploaded to the server machine, which is saved into the server license directory, and then loaded
on to the server.
Note Ensure that you do not edit the contents of the .lic file or the Cisco DCNM software ignores any
features that are associated with that license file. The contents of the file are signed and must remain
intact. When you accidentally copy, rename, or insert the license file multiple times, the duplicate
files are ignored, but the original is counted.
Assigning Licenses
Procedure
Step 1 Choose Administration > DCNM Server > License to start the license wizard.
The licenses table appears.
Step 2 From the table, choose the switch that you want to assign the license to.
Step 3 Click Assign License.
Procedure
Step 1 Choose Administration > DCNM Server > License to start the license wizard.
The licenses table appears.
Step 2 From the table, choose the switch that you want to unassign the license.
Step 3 Click Unassign License.
Procedure
The list of Servers along with its Status, Location, Local Time, and Data Sources are displayed.
Step 2 Use the Enable Automatic Failover checkbox to turn on or turn off the failover functionality.
Step 3 In the Location column, double-click to edit the location.
If the status of one of the servers in the federation is Inactive, some functionality may not work unless the
server status changes to Active.
Note Before upgrading Cisco DCNM, ensure that Enable Automatic Failover is unchecked. Otherwise,
if one server within the federation is down, the devices are moved to the other DCNM server which
comes up first after the upgrade. To prevent the automove for DCNM upgrade, you must disable
the automove on all DCNMs within the federation, and upgrade the DCNM server one by one. Only
after all the DCNMs upgrade successfully and run normally, then enable the auto move again.
Note In DCNM Federation with Auto Move enabled, if a DCNM is down, the devices under its
management is moved to the other DCNM. However after the DCNM is back, the devices won’t
move back.
The ElasticSearch Cluster section gives the details about the elastic search. It has the following fields:
Field Description
Procedure
Step 1 On the Federation page (Administration > DCNM Server > Federation), click ElasticSearch Clustering.
The Elastic Search Clustering pop-up dialog appears.
Step 2 Click Apply.
This operation synchronizes each of the elastic search nodes that associated with a Federated Server, into an
elastic search cluster. The operation is disruptive to any features using elastic search as a data store. Some
features may be impacted by ongoing data sync operations after the elastic search services are resumed.
Step 1 Multi-Site-Manager (MsM) provides a single pane for users to search for switches that are managed by DCNM
globally. MSM can do realtime search to find out which switch globally handles the traffic for a given virtual
machine based on IP address, name or mac address, and supporting VXLAN basing on segment ID as well.
It provides hyperlink to launch the switch only. This window also plays the role of remote site registration.
The registration only allows the current DCNM server to access the remote DCNM server or site. For the
remote site to access the current DCNM server, registration is required on the remote site as well.
Step 2 Choose Administration > DCNM Server > Multi Site Manager.
The MsM window displays the overall health or status of the remote site and the application health.
Step 3 You can search by Switch, VM IP, VM Name, MAC, and Segment ID.
Step 4 You can add a new DCNM server by clicking +Add DCNM Server. The Enter Remote DCNM Server
Information window opens. Fill in the information that is required and click OK to save.
Step 5 Click Refresh All Sites to display the updated information.
Management Users
The Management Users menu includes the following submenus:
Remote AAA
Procedure
Step 1 From the menu bar, choose Administration > Management Users > Remote AAA Properties.
The AAA properties configuration page appears.
Step 2 Use the radio button to select one of the following authentication modes:
• Local—In this mode the authentication will authenticate with the local server.
• Radius—In this mode the authentication will authenticate against the Radius servers specified.
• TACACS+—In this mode the authentication will authenticate against the TACAS servers specified.
• Switch—In this mode the authentication will authenticate against the switches specified.
• LDAP—In this mode the authentication will authenticate against the LDAP server specified.
Note You must restart the Cisco DCNM SAN services if you update the Remote AAA properties. You
must restart all the instances of Cisco DCNM if federation is deployed.
Local
Procedure
Step 1 Use the radio button and select Local as the authentication mode.
Step 2 Click Apply to confirm the authentication mode.
Radius
Procedure
Step 1 Use the radio button and select Radius as the authentication mode.
Step 2 Specify the Primary server details and click Test to test the server.
Step 3 (Optional) Specify the Secondary and Tertiary server details and click Test to test the server.
Step 4 Click Apply to confirm the authentication mode.
TACACS+
Procedure
Step 1 Use the radio button and select TACACS+ as the authentication mode.
Step 2 Specify the Primary server details and click Test to test the server.
Step 3 (Optional) Specify the Secondary and Tertiary server details and click Test to test the server.
Step 4 Click Apply to confirm the authentication mode.
Switch
Procedure
Step 1 Use the radio button to select Switch as the authentication mode.
DCNM also supports LAN switches with the IPv6 management interface.
Step 2 Specify the Primary Switch name and click Apply to confirm the authentication mode.
Step 3 (Optional) Specify the names for Secondary and Tertiary Switches.
Step 4 Click Apply to confirm the authentication mode.
LDAP
Procedure
Step 1 Use the radio button and select LDAP as the authentication mode.
Step 2 In the Host field, enter DNS address of the host.
Step 3 Click Test to test the AAA server. The Test AAA Server window pops out.
Step 4 Enter a valid Username and Password in the Test AAA Server window.
A dialog box appears confirming the status of the AAA server test. If the test has failed, the LDAP
Authentication Failed dialog box appears.
Procedure
Step 4 From the Role drop-down list, select a role for the user.
Step 5 In the Password field, enter the password.
Step 6 In the Confirm Password field, enter the password again.
Step 7 Click Add to add the user to the database.
Step 8 Repeat Steps 2 to 7 to continue adding users.
Procedure
Step 1 From the menu bar, choose Administration > Management Users > Local. You see the Local Users page.
Step 2 Select one or more users from the Local Users table and click the Delete User button.
Step 3 Click Yes on the warning window to delete the local user. Or click No to cancel deletion.
Editing a User
Procedure
Step 1 From the menu bar, choose Administration > Management Users > Local.
Step 2 Use the checkbox to select a user and click the Edit User icon.
Step 3 In the Edit User window, the User Name and Role is mentioned by default. Specify the Password and
Confirm Password.
Step 4 Click Apply to save the changes.
User Access
To control the local users to access the specific groups from the Cisco DCNM Web UI, perform the following
steps:
Procedure
Step 2 Select one user from the Local Users table. Click User Access.
The User Access selection window is displayed.
Step 3 Select the groups allowed to access for the user and click Apply.
Managing Clients
You can use Cisco DCNM to disconnect DCNM Client Servers.
Procedure
Step 2 Use the check box to select a DCNM server and click Disconnect Client to disconnect the DCNM server.
Note You cannot disconnect a current client session.
Performance Setup
The Performance Setup menu includes the following submenus:
Procedure
Procedure
Procedure
Step 1 From the menu bar, choose Administration > Performance Setup > User Defined.
You see the User Defined page.
Step 3 From the Switch table, select the switch for which you want to add other statistics.
Step 4 From the SNMP OID drop-down list, select the OID.
Note For SNMP OID ModuleX_Temp,IFHCInOctets.IFINDEX,IFHCOutOctest.IFINDEX, selected
from drop down box, you must replace 'X' with correct module number or the corresponding
IFINDEX.
Event Setup
The Event Setup menu includes the following submenus:
Procedure
Step 2 Select Enable Syslog Receiver checkbox and click Apply, to enable the syslog receiver if it is disabled in
the server property.
To configure the Event Registration/Syslog properties, select Administration > DCNM Server > Server
Properties and follow the on-screen instructions.
Step 3 Select Copy Syslog Messages to DB and click Apply to copy the syslog messages to the database.
If this option is not selected, the events will not be displayed in the events page of the Web client.
The columns in the second table display the following:
• Switches sending traps
• Switches sending syslog
Notification Forwarding
You can use Cisco DCNM Web UI to add and remove notification forwarding for system messages.
This section contains the following:
Procedure
Step 5 In the Event Count Filter, add a filter for the event count to the event forwarder.
The forwarding stops forwarding an event if the event count exceeds the limit as specified in the event count
filter. In this field, you can specify a count limit. Before an event can be forwarded, the Cisco DCNM checks
if its occurrence exceeds the count limit. If it does, the event will not be forwarded.
Step 6 Select the Snooze checkbox and specify the Start date and time and the End date and time. Click Apply to
save the configuration.
Step 7 Under the Event Forwarder Rules table, click the + icon to add an event forwarder rule.
You see the Add Event Forwarder Rule dialog box.
Step 8 In the Forwarding Method, choose either E-Mail or Trap. If you choose Trap, a Port field is added to the
dialog box.
Step 9 If you choose the E-mail forwarding method, enter the IP address in the Email Address field. If you choose
the Trap method, enter the trap receiver IP address in the Address field and specify the port number.
Step 10 For Forwarding Scope, choose the Fabric/LAN or Port Groups for notification.
Step 11 In the Source field, select DCNM or Syslog.
If you select DCNM, then:
a) From the Type drop-down list, choose an event type.
b) Check the Storage Ports Only check box to select only the storage ports.
c) From the Minimum Severity drop-down list, select the severity level of the messages to receive.
d) Click Add to add the notification.
If you select Syslog, then:
a) In the Facility list, select the syslog facility.
b) Specify the syslog Type.
c) In the Description Regex field, specify a description that matches with the event description.
d) From the Minimum Severity drop-down list, select the severity level of the messages to receive.
e) Click Add to add the notification.
Note The Minimum Severity option is available only if the Event Type is set to All.
The traps that are sent by Cisco DCNM correspond to the severity type followed by a text description:
trap type(s) = 40990 (emergency)
40991 (alert)
40992 (critical)
40993 (error)
40994 (warning)
40995 (notice)
40996 (info)
40997 (debug)
textDescriptionOid = 1, 3, 6, 1, 4, 1, 9, 9, 40999, 1, 1, 3, 0
Procedure
Procedure
Step 1 From the menu bar, choose Administration > Event Setup > EMC Call Home.
Step 2 Select the Enable check box to enable this feature.
Step 3 Use the check box to select the fabrics or individual switches.
Step 4 Enter the general e-mail information.
Step 5 Click the Apply to update the e-mail options.
Step 6 Click Apply and Test to update the e-mail options and test the results.
Event Suppression
Cisco DCNM allows you to suppress the specified events that are based on the user-specified suppressor rules.
Such events will not be displayed on the Cisco DCNM Web UI and SAN Client. The events will neither be
persisted to DCNM database, nor forwarded via email or SNMP trap.
You can view, add, modify, and delete suppressor rules from the table. You can create a suppressor rule from
the existing event table. Select a given event as the template, and invoke the rule dialog window. Event details
are automatically ported from the selected event in the event table to the input fields of the rule creation dialog
window.
This section includes the following:
Procedure
Step 2 Click the Add icon above the Event Suppressors table.
The Add Event Suppressor Rule window is displayed.
Step 3 In the Add Event Suppressor Rule window, specify the Name for the rule.
Step 4 Select the required Scope for the rule that is based on the event source.
In the Scope drop-down list, the LAN groups and the port groups are listed separately. You can choose
SANLAN, Port Groups or Any. For SAN and LAN, select the scope of the event at the Fabric or Group or
Switch level. You can only select groups for Port Group scope. If use selects Any as the scope, the suppressor
rule is applied globally.
Step 5 Enter the Facility name or choose from the SAN/LAN Switch Event Facility List.
If you do not specify a facility, wildcard is applied.
Step 7 In the Description Matching field, specify a matching string or regular expression.
The rule matching engine uses regular expression that is supported by Java Pattern class to find a match against
an event description text.
Step 8 Check the Active Between box and select a valid time range during which the event is suppressed.
By default, the time range is not enabled, i.e., the rule is always active.
Note In general, you must not suppress accounting events. Suppressor rule for Accounting events can be
created only for certain rare situations where Accounting events are generated by actions of DCNM
or switch software. For example, lots of 'sync-snmp-password' AAA syslog events are automatically
generated during the password synchronization between DCNM and managed switches. To suppress
Accounting events, navigate to the Suppressor table and invoke the Add Event Suppressor Rule
dialog window.
Note Choose Monitor > Switch > Events to create a suppressor rule for a known event. There is no such
shortcut to create suppressor rules for Accounting events.
Procedure
Step 1 From the menu bar, select Administration > Event Setup > Suppression.
Step 2 Select the rule from the list and click Delete icon.
Step 3 Click Yes to confirm.
Procedure
Credentials Management
The Credential Management menu includes the following submenus:
SAN Credentials
The Cisco DCNM home page, choose Administration > Credentials Management > SAN Credentials
displays the SNMP access details to the fabric seed switch. If the user has validated the access to all the fabrics,
the SNMP credentials for all the seed switches of the fabrics is displayed.
The switch credentials window for the Cisco DCNM has the following fields:
Field Description
Before the Cisco DCNM user configures the fabric using SNMP, the user must furnish and validate SNMP
credentials on the seed switch of the fabric. If the user does not provide valid credentials for the fabric seed
switch, the Switch Credentials table shows the default values for SNMPv3/SSH and AuthPrivacy fields.
Click the switch row and enter correct credentials information. Click Save to commit the changes.
If the user changes the configuration, but does not provide a valid switch credential, the user action is rejected.
Validate the switch credentials to commit your changes.
You can perform the following operations on this screen.
• To Revalidate the credentials:
1. From the Cisco DCNM home page, choose Configure > Credentials Management > SAN
Credentials, click the Fabric Name radio button to select a seed switch whose credentials are not
validated.
2. Click Revalidate.
A confirmation message appears, stating if the operation was successful or a failure.
1. From the Cisco DCNM home page, choose Administration > Credentials Management > SAN
Credentials, click the Fabric Name radio button to select a seed switch to delete.
2. Click Clear.
A confirmation message appears.
3. Click Yes to delete the switch credential from the DCNM server.
LAN Credentials
While changing the device configuration, Cisco DCNM uses the device credentials provided by you. However,
if the LAN Switch credentials are not provided, Cisco DCNM prompts you to open the Administration >
Credentials Management > LAN Credentials page to configure LAN credentials.
Cisco DCNM uses two sets of credentials to connect to the LAN devices:
• Discovery Credentials—Cisco DCNM uses these credentials during discovery and periodic polling of
the devices.
• Configuration Change Credentials—Cisco DCNM uses these credentials when user tries to use the
features that change the device configuration.
LAN Credentials Management allows you to specify configuration change credentials. Before changing any
LAN switch configuration, you must furnish Configuration Change SSH credentials for the switch. If you do
not provide the credentials, the configuration change action will be rejected.
These features get the device write credentials from LAN Credentials feature.
• Upgrade (ISSU)
• Maintenance Mode (GIR)
• Patch (SMU)
• Template Deployment
• POAP-Write erase reload, Rollback
• Interface Creation/Deletion/Configuration
• VLAN Creation/Deletion/Configuration
• VPC Wizard
You must specify the configuration change credentials irrespective of whether the devices were discovered
initially or not. This is a one-time operation. Once the credentials are set, that will be used for any configuration
change operation.
Default Credentials
Default credentials is used to connect all the devices that the user has access to. You can override the default
credentials by specifying credentials for each of the devices in the Switch Table below.
Cisco DCNM tries to use individual switch credentials in the Switch Table, to begin with. If the credentials
(username/password) columns are empty in the Switch Table, the default credentials will be used.
Switch Table
Switch table lists all the LAN switches that user has access. You can specify the switch credentials individually,
that will override the default credentials. In most cases, you need to provide only the default credentials.
You can perform the following operations on this screen.
• Edit Credentials, on page 224
• Validate Credentials, on page 224
• Clear Switch Credentials, on page 224
The LAN Credentials for the DCNM User table has the following fields.
Field Description
Edit Credentials
Perform the following task to edit the credentials.
1. From the Cisco DCNM home page, choose Administration > Credentials Management > LAN
Credentials, check the Switch check box for which you need to edit the credentials.
2. Click Edit icon.
3. Specify User Name and Password for the switch.
Validate Credentials
Perform the following task to validate the credentials.
1. From the Administration > Credentials Management > LAN Credentials, check the Switch check
box for which you need to validate the credentials.
2. Click Validate.
A confirmation message appears, stating if the operation was successful or a failure.
3. Click Yes to clear the switch credentials from the DCNM server.