Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(X)

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(X) Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) First Published: 2019-07-20 Last Modified: 2020-11-10 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2019–2020 Cisco Systems, Inc. All rights reserved. CONTENTS PREFACE Preface xix Audience xix Document Conventions xix Related Documentation for Cisco Nexus 3000 Series Switches xx Documentation Feedback xx Communications, Services, and Additional Information xx CHAPTER 1 New and Changed Information 1 New and Changed Information 1 CHAPTER 2 Overview 3 Licensing Requirements 3 System Management Features 3 CHAPTER 3 Configuring Switch Profiles 7 Information About Switch Profiles 7 Switch Profile Configuration Modes 8 Configuration Validation 8 Software Upgrades and Downgrades with Switch Profiles 9 Prerequisites for Switch Profiles 10 Guidelines and Limitations for Switch Profiles 10 Configuring Switch Profiles 11 Adding a Switch to a Switch Profile 13 Adding or Modifying Switch Profile Commands 14 Importing a Switch Profile 17 Verifying Commands in a Switch Profile 19 Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) iii Contents Isolating a Peer Switch 19 Deleting a Switch Profile 20 Deleting a Switch from a Switch Profile 20 Displaying the Switch Profile Buffer 21 Synchronizing Configurations After a Switch Reboot 22 Switch Profile Configuration show Commands 23 Supported Switch Profile Commands 23 Configuration Examples for Switch Profiles 25 Creating a Switch Profile on a Local and Peer Switch Example 25 Verifying the Synchronization Status Example 26 Displaying the Running Configuration 27 Displaying the Switch Profile Synchronization Between Local and Peer Switches 27 Displaying Verify and Commit on Local and Peer Switches 28 Successful and Unsuccessful Synchronization Examples 29 Configuring the Switch Profile Buffer, Moving the Buffer, and Deleting the Buffer 29 CHAPTER 4 Using Cisco Fabric Services 31 Information About CFS 31 CFS Distribution 32 CFS Distribution Modes 32 Uncoordinated Distribution 32 Coordinated Distribution 32 Unrestricted Uncoordinated Distributions 32 Verifying the CFS Distribution Status 33 CFS Support for Applications 33 CFS Application Requirements 33 Enabling CFS for an Application 33 Verifying Application Registration Status 33 Locking the Network 34 Verifying CFS Lock Status 35 Committing Changes 35 Discarding Changes 35 Saving the Configuration 35 Clearing a Locked Session 35 Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) iv Contents CFS Regions 36 About CFS Regions 36 Example Scenario 36 Managing CFS Regions 36 Creating CFS Regions 36 Assigning Applications to CFS Regions 37 Moving an Application to a Different CFS Region 37 Removing an Application from a Region 38 Deleting CFS Regions 38 Configuring CFS over IP 39 Enabling CFS over IPv4 39 Verifying the CFS Over IP Configuration 39 Configuring IP Multicast Addresses for CFS over IP 39 Configuring IPv4 Multicast Address for CFS 39 Verifying the IP Multicast Address Configuration for CFS over IP 40 Default Settings for CFS 40 CHAPTER 5 Configuring PTP 41 Information About PTP 41 PTP Device Types 41 PTP Process 42 High Availability for PTP 43 Guidelines and Limitations for PTP 43 Default Settings for PTP 43 Configuring PTP 44 Configuring PTP Globally 44 Configuring PTP on an Interface 46 Configuring Multiple PTP Domains 47 Configuring clock Identity 50 Configuring PTP Cost Interface 50 Configuring the Mean Path Delay Threshold Value 51 Configuring a PTP Interface to Stay in a Master State 52 Verifying the PTP Configuration 53 Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) v Contents CHAPTER 6 Configuring NTP 55 Information About NTP 55 NTP as Time Server 56 Distributing NTP Using CFS 56 Clock Manager 56 High Availability 56 Virtualization Support 56 Prerequisites for NTP 57 Guidelines and Limitations for NTP 57 Default Settings 58 Configuring NTP 59 Enabling or Disabling NTP on an Interface 59 Configuring the Device as an Authoritative NTP Server 59 Configuring an NTP Server and Peer 60 Configuring NTP Authentication 62 Configuring NTP Access Restrictions 63 Configuring the NTP Source IP Address 65 Configuring the NTP Source Interface 66 Configuring an NTP Broadcast Server 66 Configuring an NTP Multicast Server 67 Configuring an NTP Multicast Client 68 Configuring NTP Logging 68 Enabling CFS Distribution for NTP 69 Committing NTP Configuration Changes 70 Discarding NTP Configuration Changes 70 Releasing the CFS Session Lock 70 Verifying the NTP Configuration 71 Configuration Examples for NTP 72 CHAPTER 7 Configuring User Accounts and RBAC 75 Information About User Accounts and RBAC 75 User Roles 75 Rules 76 Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) vi Contents User Role Policies 76 User Account Configuration Restrictions 77 User Password Requirements 77 Guidelines and Limitations for User Accounts 78 Configuring User Accounts 79 Configuring SAN Admin Users 80 Configuring RBAC 81 Creating User Roles and Rules 81 Creating Feature Groups 82 Changing User Role Interface Policies 83 Changing User Role VLAN Policies 84 Changing User Role VSAN Policies 84 Verifying the User Accounts and RBAC Configuration 85 Configuring User Accounts Default Settings for the User Accounts and RBAC 85 CHAPTER 8 Configuring System Message Logging 87 Information About System Message Logging 87 Syslog Servers 88 Secure Syslog Servers 88 Guidelines and Limitations for System Message Logging 88 Default Settings for System Message Logging 89 Configuring System Message Logging 89 Configuring System Message Logging to Terminal Sessions 89 Configuring System Message Logging to a File 91 Configuring Module and Facility Messages Logging 93 Configuring Logging Timestamps 95 Configuring the ACL Logging Cache 96 Applying ACL Logging to an Interface 96 Configuring a Logging Source-Interface 97 Configuring the ACL Log Match Level 98 Configuring Syslog Servers 99 Configuring syslog on a UNIX or Linux System 100 Configuring Secure Syslog Servers 101 Configuring the CA Certificate 102 Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) vii Contents Enrolling the CA Certificate 103 Configuring syslog Server Configuration Distribution 104 Displaying and Clearing Log Files 105 Verifying the System Message Logging Configuration 106 Repeated System Logging Messages 107 CHAPTER 9 Configuring Smart Call Home 109 Information About Smart Call Home 109 Smart Call Home Overview 110 Smart Call Home Destination Profiles 110 Smart Call Home Alert Groups 111 Smart Call Home Message Levels 112 Call Home Message Formats 113 Guidelines and Limitations for Smart Call Home 117 Prerequisites for Smart Call Home 117 Default Call Home Settings 118 Configuring Smart Call Home 118 Registering for Smart Call Home 118 Configuring Contact Information 119 Creating a Destination Profile 120 Modifying a Destination Profile 121 Associating an Alert Group with a Destination Profile 123 Adding Show Commands to an Alert Group 123 Configuring E-Mail Server Details 124 Configuring Periodic Inventory Notifications 125 Disabling Duplicate Message Throttling 126 Enabling or Disabling Smart Call Home 127 Testing the Smart Call Home Configuration 127 Verifying the Smart Call Home Configuration 128 Sample Syslog Alert Notification in Full-Text Format 128 Sample Syslog Alert Notification in XML Format 129 CHAPTER 10 Configuring Session Manager 133 Information About Session Manager 133 Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) viii Contents Guidelines and Limitations for Session Manager 133 Configuring Session Manager 134 Creating a Session 134 Configuring ACLs in a Session 134 Verifying a Session 135 Committing a Session 135 Saving a Session 135 Discarding a Session 135 Configuration Example for Session Manager 135 Verifying the Session Manager Configuration 136 CHAPTER 11 Configuring the Scheduler 137 Information About the Scheduler 137 Remote User Authentication 138 Scheduler Log Files 138 Guidelines and Limitations for the Scheduler 138 Default Settings for the Scheduler 138 Configuring the Scheduler 139 Enabling the Scheduler 139 Defining the Scheduler Log File Size 139 Configuring Remote User Authentication 140 Defining a Job 141 Deleting a Job 142 Defining a Timetable 142 Clearing the Scheduler Log File 144 Disabling the Scheduler 144 Verifying the Scheduler Configuration 145 Configuration Examples for the Scheduler 145 Creating a Scheduler Job 145 Scheduling a Scheduler Job 145 Displaying the Job Schedule 145 Displaying the Results of Running Scheduler Jobs 146 Standards for the Scheduler 146 Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) ix Contents CHAPTER 12 Configuring SNMP 147 Information About SNMP 147 SNMP Functional Overview 147 SNMP Notifications 148 SNMPv3 148 Security Models and Levels for SNMPv1, v2, and v3 148 User-Based Security Model 149 CLI and SNMP User Synchronization 150 Group-Based SNMP Access 151 Guidelines and Limitations for SNMP 151 Default SNMP Settings 151 Configuring SNMP 151 Configuring the SNMP Source Interface 151 Configuring SNMP Users 152 Enforcing SNMP Message Encryption 153 Assigning SNMPv3 Users to Multiple Roles 154 Creating SNMP Communities 154 Filtering SNMP Requests 154 Configuring SNMP Notification Receivers 155 Configuring
Recommended publications
  • Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(X)
    Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x) First Published: 2019-07-20 Last Modified: 2021-09-22 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS REFERENCED IN THIS DOCUMENTATION ARE SUBJECT TO CHANGE WITHOUT NOTICE. EXCEPT AS MAY OTHERWISE BE AGREED BY CISCO IN WRITING, ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS DOCUMENTATION ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. The Cisco End User License Agreement and any supplemental license terms govern your use of any Cisco software, including this product documentation, and are located at: http://www.cisco.com/go/softwareterms.Cisco product warranty information is available at http://www.cisco.com/go/warranty. US Federal Communications Commission Notices are found here http://www.cisco.com/c/en/us/products/us-fcc-notice.html. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any products and features described herein as in development or available at a future date remain in varying stages of development and will be offered on a when-and if-available basis. Any such product or feature roadmaps are subject to change at the sole discretion of Cisco and Cisco will have no liability for delay in the delivery or failure to deliver any products or feature roadmap items that may be set forth in this document.
    [Show full text]
  • SRD Configuration Guide October 21, 2008
    Cisco Persistent Storage Device for Cisco IOS Release 12.2(33)SRD Configuration Guide October 21, 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
    [Show full text]
  • Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9
    Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9 First Published: 2019-01-09 Last Modified: 2019-05-20 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • In the United States Bankruptcy Court for the District of Delaware
    Case 21-10457-LSS Doc 237 Filed 05/13/21 Page 1 of 2 IN THE UNITED STATES BANKRUPTCY COURT FOR THE DISTRICT OF DELAWARE Chapter 11 In re: Case No. 21-10457 (LSS) MOBITV, INC., et al., Jointly Administered Debtors.1 Related Docket Nos. 73 and 164 NOTICE OF FILING OF SUCCESSFUL BIDDER ASSET PURCHASE AGREEMENT PLEASE TAKE NOTICE that, on April 7, 2021, the United States Bankruptcy Court for the District of Delaware (the “Bankruptcy Court”) entered the Order (A) Approving Bidding Procedures for the Sale of Substantially All Assets of the Debtors; (B) Approving Procedures for the Assumption and Assignment of Executory Contracts and Unexpired Leases; (C) Scheduling the Auction and Sale Hearing; and (D) Granting Related Relief [Docket No. 164] (the “Bidding Procedures Order”).2 PLEASE TAKE FURTHER NOTICE that, pursuant to the Bidding Procedures Order, the Debtors conducted an auction on May 11-12, 2021 for substantially all of the Debtors’ assets (the “Assets”). At the conclusion of the auction, the Debtors, in consultation with their advisors and the Consultation Parties, selected the bid submitted by TiVo Corporation (the “Successful Bidder”) as the Successful Bid. PLEASE TAKE FURTHER NOTICE that, on May 12, 2021, the Debtors filed the Notice of Auction Results [Docket No. 234] with the Bankruptcy Court. PLEASE TAKE FURTHER NOTICE that attached hereto as Exhibit A is the Asset Purchase Agreement dated May 12, 2021 (the “Successful Bidder APA”) between the Debtors and the Successful Bidder. PLEASE TAKE FURTHER NOTICE that a hearing is scheduled for May 21, 2021 at 2:00 p.m.
    [Show full text]
  • Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 6.X First Published: 2013-11-20 Last Modified: 2014-09-26
    Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 6.x First Published: 2013-11-20 Last Modified: 2014-09-26 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cisco Nexus 5000 Series Switches At-A-Glance
    Cisco Nexus 5000 Series Switches At-A-Glance Switches to Simplify Data Center Transformation Cisco Nexus 5000 Series Switches simplify cable • End-to-end FCoE: FCoE is an open standards–based Cisco Nexus® 5000 Series Switches, part of the unified fabric management, allowing hosts to connect to any network protocol that encapsulates Fibre Channel over Ethernet, component of the Cisco® Data Center Business Advantage through a unified Ethernet interface and enabling faster eliminating the need for separate switches, cabling, (DCBA) architectural framework, deliver an innovative rollout of new applications and services. adapters, and transceivers for each class of traffic.This architecture to simplify data center transformation by Main Features feature dramatically decreases power consumption enabling a high-performance, standards-based, and reduces both capital expenditures (CapEx) and • High-performance, low-latency 10 Gigabit Ethernet, multi-protocol, multi-purpose, Ethernet-based fabric. operating expenses (OpEx) for businesses. delivered by a cut-through switching architecture, for They help consolidate separate LAN, SAN, and server cluster 10 Gigabit Ethernet server access in next-generation • Multi-hop FCoE: Cisco Unified Fabric unites data network environments into a single Ethernet fabric. Backed data centers center and storage networks to deliver a single by a broad system of industry-leading technology partners, • Fibre Channel over Ethernet (FCoE)–capable switches high-performance, highly available and scalable Cisco Nexus 5000
    [Show full text]
  • TR-4350: Flexpod Express with Microsoft Windows Server 2012 R2
    Technical Report FlexPod Express with Microsoft Windows Server 2012 R2 Hyper-V: Large Configuration Implementation Guide Glenn Sizemore, Arvind Ramakrishnan, Karthick Radhakrishnan, NetApp Jeffrey Fultz, Cisco Systems October 2014 | TR-4350 TABLE OF CONTENTS 1 Overview ................................................................................................................................................ 5 2 Audience ................................................................................................................................................ 5 3 Architecture ........................................................................................................................................... 5 3.1 Large Configuration .......................................................................................................................................... 5 4 Hardware Details ................................................................................................................................... 6 4.1 Large Configuration ........................................................................................................................................6 5 Software Details .................................................................................................................................... 6 6 Configuration Guidelines ..................................................................................................................... 7 7 FlexPod Express Cabling Information .............................................................................................
    [Show full text]
  • Cisco Nexus 9300 Switch Datasheet CONTENT
    Cisco Nexus 9300 Switch Datasheet CONTENT Content ................................................................................................................................................ 1 Overview .............................................................................................................................................. 2 Appearance .......................................................................................................................................... 2 Nexus 9300 switches characteristics ..................................................................................................... 3 Cisco NX-OS Software Overview ........................................................................................................... 7 Specification of Nexus 9300 series switches ......................................................................................... 9 Base model ordering information ....................................................................................................... 12 Sources ............................................................................................................................................... 12 Contact Us Tel: +1-626-239-8066 (USA) +852-3050-1066 / +852-3174-6166 / +852-9795-4940 (Hong Kong) Fax: +852-3050-1066 (Hong Kong) Email: [email protected] (Sales Inquiries) [email protected] (CCIE Technical Support) ROUTER SWITCH LIMITED 1 OVERVIEW The Cisco Nexus® 9000 Series Switches include both modular and fixed-port switches
    [Show full text]
  • Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade Guide, Release 9.3(X)
    Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade Guide, Release 9.3(x) First Published: 2021-01-18 Last Modified: 2021-09-23 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 7.X
    Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 7.x First Published: 2015-02-01 Last Modified: 2021-09-14 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS REFERENCED IN THIS DOCUMENTATION ARE SUBJECT TO CHANGE WITHOUT NOTICE. EXCEPT AS MAY OTHERWISE BE AGREED BY CISCO IN WRITING, ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS DOCUMENTATION ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. The Cisco End User License Agreement and any supplemental license terms govern your use of any Cisco software, including this product documentation, and are located at: http://www.cisco.com/go/softwareterms.Cisco product warranty information is available at http://www.cisco.com/go/warranty. US Federal Communications Commission Notices are found here http://www.cisco.com/c/en/us/products/us-fcc-notice.html. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any products and features described herein as in development or available at a future date remain in varying stages of development and will be offered on a when-and if-available basis. Any such product or feature roadmaps are subject to change at the sole discretion of Cisco and Cisco will have no liability for delay in the delivery or failure to deliver any products or feature roadmap items that may be set forth in this document.
    [Show full text]
  • Cisco Nexus 5000 Series Switches
    Data Sheet Cisco Nexus 5000 Series Switches Product Overview The Cisco Nexus™ 5000 Series Switches comprise a family of line-rate, low-latency, lossless 10 Gigabit Ethernet and Fibre Channel over Ethernet (FCoE) switches for data center applications (Figure 1). Figure 1. The Cisco Nexus 5000 Series Includes the Cisco Nexus 5010 Switch and Cisco Nexus 5020 Switch Supporting 10 Gigabit Ethernet and FCoE Today’s data centers are increasingly filled with dense rack-mount and blade servers that host powerful multicore processors. The rapid increase of in-rack computing density, along with the increasing use of virtualization software, combine to push the demand for 10 Gigabit Ethernet and consolidated I/O: applications for which the Cisco Nexus 5000 Series is an excellent match. With low latency, front-to-back cooling, and rear-facing ports, the Cisco Nexus 5000 Series is designed for data centers transitioning to 10 Gigabit Ethernet as well as those ready to deploy a unified fabric that can handle their LAN, SAN, and server clusters, providing networking over a single link (or dual links for redundancy). The switch family, using cut-through architecture, supports line-rate 10 Gigabit Ethernet on all ports while maintaining consistently low latency independent of packet size and services enabled. It supports a set of network technologies known collectively as IEEE Data Center Bridging (DCB) that increases the reliability, efficiency, and scalability of Ethernet networks. These features allow the switches to support multiple traffic classes over a lossless Ethernet fabric, thus enabling consolidation of LAN, SAN, and cluster environments. Its ability to connect FCoE to native Fibre Channel protects existing storage system investments while dramatically simplifying in-rack cabling.
    [Show full text]
  • Caretech Solutions Offers Active-Active Recovery
    Customer Case Study Service Provider Offers Active-Active Recovery Service Executive Summary CareTech Solutions used Overlay Transport CareTech Solutions Virtualization to split server clusters between • Service Provider for Healthcare two data centers. • Troy, Michigan • 700 Employees Challenge Challenge CareTech Solutions provides IT and web products and services to hospitals and health • Build secure multitenant systems throughout the United States. In 2008-2010, the company won the award environment for healthcare for IT outsourcing from KLAS, an independent researcher helping healthcare providers customers make technology decisions. • Scale to serve more customers CareTech has grown steadily in a challenged economy, and anticipates a surge in using more services business as recovery continues. To prepare for growth and respond to heightened • Enhance disaster recovery service customer interest in disaster recovery, CareTech built a second data center facility Solution about one mile from the primary facility, connecting the two buildings over IP. “Our • Cisco Nexus Switches and Cisco healthcare customers have come to appreciate the cost savings from shared MDS 9200 Multilayer Switch equipment, so we wanted a secure, operationally efficient multitenant environment,” • Overlay Transport Virtualization says Louie Caschera, Chief Information Officer for CareTech solutions. feature for Layer 2 LAN extension Layer 2 connectivity between the two facilities would make it possible to split Results customers’ application clusters between the two sites, so that CareTech could move • Strengthened disaster recovery workload over the network if either facility went down. The environment is 95percent service with active-active virtualized. “We already offered an active-standby configuration within one data center, data centers and extending it to two data centers would provide even greater high-availability and • Acquired 10Gbps bandwidth to disaster-recovery capabilities,” says Caschera.
    [Show full text]