Cisco Nexus 7000 Series NX-OS Command Reference Master Index, Release 5.x - A to R

合集下载

Cisco_Nexus_7000交换矩阵模块

Cisco_Nexus_7000交换矩阵模块

Cisco Nexus 7000 交换矩阵模块产品概述Cisco Nexus TM7000系列交换机构成一个模块化数据中心级产品系列,适用于高度可扩展的万兆以太网网络,其交换矩阵架构的速度可扩展至15Tbps。

它的设计宗旨是为满足大多数关键任务数据中心的要求,提供持续的系统运营和虚拟化、无所不在的服务。

Cisco Nexus 7000系列建立在一个成熟的操作系统上,其增强特性提供不中断服务情况下的实时系统升级,同时还提供出色的可管理性和可维护性。

它的创新设计专门用于支持端到端数据中心连接,它将IP、存储和IPC(进程间通讯)网络整合到单一以太网交换矩阵上。

适用于Cisco Nexus 7000系列机箱的Cisco Nexus 7000交换矩阵模块(参见图1和图2)是独立的交换矩阵模块,为每个I/O和控制引擎模块插槽提供并行交换矩阵信道。

最多能够同时共用5个激活的交换矩阵模块,提供每插槽高达230 Gbps的带宽。

通过并行转发架构,这五个交换矩阵模块能实现超过8 Tbps的系统容量。

此交换矩阵模块为I/O模块上的完全分布式转发提供中央交换组件。

图1Cisco Nexus 7000 10插槽交换矩阵模块图2Cisco Nexus 7000 18插槽交换矩阵模块特性和优势通过支持1到5个并行激活交换矩阵模块,随需求增长而提高性能,能够实现交换交换矩阵可扩展性。

所有交换矩阵模块都与模块插槽相连。

每添加一个交换矩阵模块,即增加所有模块插槽的带宽,系统支持的上限为5个模块。

该架构支持无丢包交换矩阵故障切换,其余交换矩阵模块会将带宽负载均衡至所有I/O模块插槽,有助于确保平稳降级。

Cisco Nexus 7000 交换矩阵模块与控制引擎和I/O模块的结合,支持虚拟输出队列(VoQ),并为交叉矩阵交换机提供基于信用点的仲裁,以提高分布式转发系统的性能。

当速度不匹配或争用某一上行链路接口时,VoQ和基于信用点的仲裁支持资源的公平共享。

nexus 7000 ntp配置

nexus 7000 ntp配置

C H A P T E RS e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.3-1Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.xOL-20635-033Configuring NTPThis chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections:•Information About NTP, page 3-1•Licensing Requirements for NTP, page 3-3•Prerequisites for NTP, page 3-3•Guidelines and Limitations, page 3-3 •Default Settings, page 3-4•Configuring NTP, page 3-4•Verifying the NTP Configuration, page 3-16•Configuration Examples for NTP, page 3-17•Additional References, page 3-18•Feature History for NTP, page 3-19Information About NTPThis section includes the following topics:•NTP Overview, page 3-1•NTP as Time Server, page 3-2•Distributing NTP Using CFS, page 3-2•Clock Manager, page 3-2•High Availability, page 3-3•Virtualization Support, page 3-3NTP OverviewThe Network Time Protocol (NTP) synchronizes the time of day among a set of distributed time servers and clients so that you can correlate events when you receive system logs and other time-specific events from multiple network devices. NTP uses the User Datagram Protocol (UDP) as its transport protocol. All NTP communications use Coordinated Universal Time (UTC).Chapter3 Configuring NTP Information About NTPS e n d d o c u m e n t c o m m e n t s t o n e x u s7k-d o c f e e d b a ck@c i s c o.c o m.An NTP server usually receives its time from an authoritative time source, such as a radio clock or anatomic clock attached to a time server, and then distributes this time across the network. NTP isextremely efficient; no more than one packet per minute is necessary to synchronize two machines towithin a millisecond of each other.NTP uses a stratum to describe the distance between a network device and an authoritative time source:• A stratum 1 time server is directly attached to an authoritative time source (such as a radio or atomic clock or a GPS time source).• A stratum 2 NTP server receives its time through NTP from a stratum 1 time server.Before synchronizing, NTP compares the time reported by several network devices and does notsynchronize with one that is significantly different, even if it is a stratum 1. Because Cisco NX-OScannot connect to a radio or atomic clock and act as a stratum 1 server, we recommend that you use thepublic NTP servers available on the Internet. If the network is isolated from the Internet, Cisco NX-OSallows you to configure the time as though it were synchronized through NTP, even though it was not.Note You can create NTP peer relationships to designate the time-serving hosts that you want your network device to consider synchronizing with and to keep accurate time if a server failure occurs.The time kept on a device is a critical resource, so we strongly recommend that you use the securityfeatures of NTP to avoid the accidental or malicious setting of incorrect time. Two mechanisms areavailable: an access list-based restriction scheme and an encrypted authentication mechanism. NTP as Time ServerBeginning with Cisco NX-OS Release 5.2, the Cisco NX-OS device can use NTP to distribute time.Other devices can configure it as a time server. You can also configure the device to act as anauthoritative NTP server, enabling it to distribute time even when it is not synchronized to an outsidetime source.Distributing NTP Using CFSCisco Fabric Services (CFS) distributes the local NTP configuration to all Cisco devices in the network.After enabling CFS on your device, a network-wide lock is applied to NTP whenever an NTPconfiguration is started. After making the NTP configuration changes, you can discard or commit them.In either case, the CFS lock is then released from the NTP application.For more information about CFS, see the “Configuring CFS” section on page2-1.Clock ManagerClocks are resources that need to be shared across different processes and across different VDCs.Multiple time synchronization protocols, such as NTP and Precision Time Protocol (PTP), might berunning in the system, and multiple instances of the same protocol might be running in different VDCs.Beginning with Cisco NX-OS Release 5.2, the clock manager allows you to specify the protocol and aVDC running that protocol to control the various clocks in the system. Once you specify the protocoland VDC, the system clock starts updating. For information on configuring the clock manager, see theCisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 5.x.Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.xOL-20635-03Chapter3 Configuring NTPLicensing Requirements for NTPS e n d d o c u m e n t c o m m e n t s t o n e x u s7k-d o c f e e d b a ck@c i s c o.c o m. High AvailabilityStateless restarts are supported for NTP. After a reboot or a supervisor switchover, the runningconfiguration is applied. For more information on high availability, see the Cisco Nexus 7000 SeriesNX-OS High Availability and Redundancy Guide, Release 5.x.You can configure NTP peers to provide redundancy in case an NTP server fails. Virtualization SupportIf you are running a Cisco NX-OS Release prior to 5.2, up to one instance of NTP is supported on theentire platform. You must configure NTP in the default virtual device context (VDC), and you areautomatically placed in the default VDC unless you specify otherwise.If you are running Cisco NX-OS Release 5.2 or later, multiple instances of NTP are supported, oneinstance per VDC. By default, Cisco NX-OS places you in the default VDC unless you specificallyconfigure another VDC.Only one VDC (the default VDC by default) synchronizes the system clock at any given time. The NTPdaemon in all other VDCs acts only as an NTP server for the other devices. To change which VDCsynchronizes the system clock, use the clock protocol ntp vdc vdc-id command.NTP recognizes virtual routing and forwarding (VRF) instances. NTP uses the default VRF if you do notconfigure a specific VRF for the NTP server and NTP peer. See the Cisco Nexus 7000 Series NX-OSUnicast Routing Configuration Guide, Release 5.x for more information about VRFs.For more information about VDCs, see the Cisco Nexus 7000 Series NX-OS Virtual Device ContextConfiguration Guide, Release 5.x.Licensing Requirements for NTPProduct License RequirementCisco NX-OS NTP requires no license. Any feature not included in a license package is bundled with the Cisco NX-OS system images and is provided at no extra charge to you. For a complete explanation of the Cisco NX-OSlicensing scheme, see the Cisco NX-OS Licensing Guide.Prerequisites for NTPNTP has the following prerequisites:•To configure NTP, you must have connectivity to at least one server that is running NTP.•To configure VDCs, you must install the Advanced Services license. See the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 5.x. Guidelines and LimitationsNTP has the following configuration guidelines and limitations:Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.x OL-20635-03Chapter3 Configuring NTP Default SettingsS e n d d o c u m e n t c o m m e n t s t o n e x u s7k-d o c f e e d b a ck@c i s c o.c o m.•NTP server functionality is supported starting in Cisco NX-OS Release 5.2.•You should have a peer association with another device only when you are sure that your clock is reliable (which means that you are a client of a reliable NTP server).• A peer configured alone takes on the role of a server and should be used as a backup. If you have two servers, you can configure several devices to point to one server and the remaining devices topoint to the other server. You can then configure a peer association between these two servers tocreate a more reliable NTP configuration.•If you have only one server, you should configure all the devices as clients to that server.•You can configure up to 64 NTP entities (servers and peers).•If CFS is disabled for NTP, then NTP does not distribute any configuration and does not accept a distribution from other devices in the network.•After CFS distribution is enabled for NTP, the entry of an NTP configuration command locks the network for NTP configuration until a commit command is entered. During the lock, no changescan be made to the NTP configuration by any other device in the network except the device thatinitiated the lock.•If you use CFS to distribute NTP, all devices in the network should have the same VRFs configured as you use for NTP.•If you configure NTP in a VRF, ensure that the NTP server and peers can reach each other through the configured VRFs.•You must manually distribute NTP authentication keys on the NTP server and Cisco NX-OS devices across the network.Default SettingsTable3-1 lists the default settings for NTP parameters.T able3-1Default NTP ParametersParameters DefaultNTP Enabled in all VDCsNTP authentication DisabledNTP access EnabledNTP logging DisabledConfiguring NTPThis section includes the following topics:•Enabling or Disabling NTP, page3-5•Configuring the Device as an Authoritative NTP Server, page3-6•Configuring an NTP Server and Peer, page3-7•Configuring NTP Authentication, page3-10•Configuring NTP Access Restrictions, page3-11Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.xOL-20635-03S e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.3-5Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.xOL-20635-03Chapter 3 Configuring NTPConfiguring NTP•Configuring the NTP Source IP Address, page 3-13•Configuring the NTP Source Interface, page 3-13•Configuring NTP Logging, page 3-13•Enabling CFS Distribution for NTP, page 3-14•Committing NTP Configuration Changes, page 3-15•Discarding NTP Configuration Changes, page 3-16•Releasing the CFS Session Lock, page 3-16NoteBe aware that the Cisco NX-OS commands for this feature may differ from those commands used in Cisco IOS.Enabling or Disabling NTPYou can enable or disable NTP in a particular VDC. NTP is enabled in all VDCs by default.BEFORE YOU BEGINMake sure that you are in the correct VDC. To change the VDC, use the switchto vdc command.SUMMARY STEPS1.config t2.[no] feature ntp3.(Optional) show ntp status4.(Optional) copy running-config startup-configDETAILED STEPSCommandPurposeStep 1config tExample:switch# config tEnter configuration commands, one per line. End with CNTL/Z.switch(config)#Places you in global configuration mode.Step 2[no ] feature ntpExample:switch(config)# feature ntpEnables or disables NTP in a particular VDC. NTP is enabled by default.NoteIf you are running a Cisco NX-OS Release prior to 5.2, NTP is enabled or disabled using the [no ] ntp enable command.S e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.xOL-20635-03Chapter 3 Configuring NTPConfiguring NTPThis example shows how to disable NTP:switch# config tEnter configuration commands, one per line. End with CNTL/Z.switch(config)# no feature ntpConfiguring the Device as an Authoritative NTP ServerYou can configure the device to act as an authoritative NTP server, enabling it to distribute time even when it is not synchronized to an existing time server.BEFORE YOU BEGINMake sure that you are in the correct VDC. To change the VDC, use the switchto vdc command.SUMMARY STEPS1.config t2.[no] ntp master [stratum ]3.(Optional) show running-config ntp4.(Optional) copy running-config startup-configDETAILED STEPSStep 3show ntp statusExample:switch(config)# show ntp status Distribution: EnabledLast operational state: Fabric Locked(Optional) Displays the status of the NTP application.Step 4copy running-config startup-config Example:switch(config)# copy running-config startup-config(Optional) Saves the change persistently through reboots and restarts by copying the running configuration to the startup configuration.CommandPurposeCommandPurposeStep 1config tExample:switch# config tEnter configuration commands, one per line. End with CNTL/Z.switch(config)#Places you in global configuration mode.Step 2[no ] ntp master [stratum ]Example:switch(config)# ntp masterConfigures the device as an authoritative NTP server.You can specify a different stratum level from which NTP clients get their time synchronized. The range is from 1 to 15.S e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.xOL-20635-03Chapter 3 Configuring NTPConfiguring NTPThis example shows how to configure the Cisco NX-OS device as an authoritative NTP server with a different stratum level:switch# config tEnter configuration commands, one per line. End with CNTL/Z.switch(config)# ntp master 5Configuring an NTP Server and PeerYou can configure an NTP server and peer.BEFORE YOU BEGINMake sure that you are in the correct VDC. To change the VDC, use the switchto vdc command.Make sure you know the IP address or DNS names of your NTP server and its peers.If you plan to use CFS to distribute your NTP configuration to other devices, then you should have already completed the following:–Enabled CFS distribution using the “Configuring CFS Distribution” section on page 2-6.–Enabled CFS for NTP using the “Enabling CFS Distribution for NTP” section on page 3-14.SUMMARY STEPS1.config t2.[no ] ntp server {ip-address | ipv6-address | dns-name } [key key-id ] [maxpoll max-poll ] [minpoll min-poll ] [prefer ] [use-vrf vrf-name ]3.[no ] ntp peer {ip-address | ipv6-address | dns-name } [key key-id ] [maxpoll max-poll ] [minpoll min-poll ] [prefer ] [use-vrf vrf-name ]4.(Optional) show ntp peers5.(Optional) copy running-config startup-configStep 3show running-config ntpExample:switch(config)# show running-config ntp(Optional) Displays the NTP configuration.Step 4copy running-config startup-config Example:switch(config)# copy running-config startup-config(Optional) Saves the change persistently through reboots and restarts by copying the running configuration to the startup configuration.CommandPurposeS e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.xOL-20635-03Chapter 3 Configuring NTPConfiguring NTPDETAILED STEPSCommandPurposeStep 1config tExample:switch# config tEnter configuration commands, one per line. End with CNTL/Z.switch(config)#Places you in global configuration mode.Step 2[no ] ntp server {ip-address | ipv6-address | dns-name } [key key-id ] [maxpoll max-poll ] [minpoll min-poll ] [prefer ] [use-vrf vrf-name ]Example:switch(config)# ntp server 192.0.2.10Forms an association with a server.Use the key keyword to configure a key to be used while communicating with the NTP server. The range for the key-id argument is from 1 to 65535.Use the maxpoll and minpoll keywords toconfigure the maximum and minimum intervals in which to poll a peer. The range for themax-poll and min-poll arguments is from 4 to 16 seconds, and the default values are 6 and 4, respectively.Use the prefer keyword to make this the preferred NTP server for the device.Use the use-vrf keyword to configure the NTP server to communicate over the specified VRF. The vrf-name argument can be default , management , or any case-sensitive alphanumeric string up to 32 characters.NoteIf you configure a key to be used while communicating with the NTP server, make sure that the key exists as a trusted key on the device. For more information on trusted keys, see the “Configuring NTP Authentication” section on page 3-10.S e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.xOL-20635-03Chapter 3 Configuring NTPConfiguring NTPThis example shows how to configure an NTP server and peer:switch# config tEnter configuration commands, one per line. End with CNTL/Z.switch(config)# ntp server 192.0.2.10 key 10 use-vrf Red switch(config)# ntp peer 2001:0db8::4101 prefer use-vrf Red switch(config)# show ntp peers-------------------------------------------------- Peer IP Address Serv/Peer -------------------------------------------------- 2001:0db8::4101 Peer (configured) 192.0.2.10 Server (configured) switch(config)# copy running-config startup-config [########################################] 100%switch(config)#Step 3[no ] ntp peer {ip-address | ipv6-address | dns-name } [key key-id ] [maxpoll max-poll ] [minpoll min-poll ] [prefer ] [use-vrf vrf-name ]Example:switch(config)# ntp peer 2001:0db8::4101Forms an association with a peer. You can specify multiple peer associations.Use the key keyword to configure a key to be used while communicating with the NTP peer. The range for the key-id argument is from 1 to 65535.Use the maxpoll and minpoll keywords toconfigure the maximum and minimum intervals in which to poll a peer. The range for themax-poll and min-poll arguments is from 4 to 17 seconds, and the default values are 6 and 4, respectively.Use the prefer keyword to make this the preferred NTP peer for the device.Use the use-vrf keyword to configure the NTP peer to communicate over the specified VRF. The vrf-name argument can be default , management , or any case-sensitive alphanumeric string up to 32 characters.Step 4show ntp peersExample:switch(config)# show ntp peers(Optional) Displays the configured server and peers.NoteA domain name is resolved only when you have a DNS server configured.Step 5copy running-config startup-config Example:switch(config)# copy running-config startup-config(Optional) Saves the change persistently through reboots and restarts by copying the running configuration to the startup configuration.CommandPurposeS e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.xOL-20635-03Chapter 3 Configuring NTPConfiguring NTPConfiguring NTP AuthenticationYou can configure the device to authenticate the time sources to which the local clock is synchronized. When you enable NTP authentication, the device synchronizes to a time source only if the source carries one of the authentication keys specified by the ntp trusted-key command. The device drops any packets that fail the authentication check and prevents them from updating the local clock. NTP authentication is disabled by default.BEFORE YOU BEGINMake sure that you configured the NTP server with the authentication keys that you plan to specify in this procedure. See the “Configuring an NTP Server and Peer” section on page 3-7 for information.Make sure that you are in the correct VDC. To change the VDC, use the switchto vdc command.SUMMARY STEPS1.config t2.[no ] ntp authentication-key number md5 md5-string3.(Optional) show ntp authentication-keys4.[no ] ntp trusted-key number5.(Optional) show ntp trusted-keys6.[no ] ntp authenticate7.(Optional) show ntp authentication-status 8.(Optional) copy running-config startup-configDETAILED STEPSCommandPurposeStep 1config tExample:switch# config tEnter configuration commands, one per line. End with CNTL/Z.switch(config)#Places you in global configuration mode.Step 2[no ] ntp authentication-key number md5 md5-stringswitch(config)# ntp authentication-key 42 md5aNiceKeyDefines the authentication keys. The device does not synchronize to a time source unless the source has one of these authentication keys and the key number is specified by the ntp trusted-key number command.The range for authentication keys is from 1 to 65535. Cisco NX-OS Release 5.2(3) and later 5.x releases support up to 15 alphanumeric characters for the MD5 string. Earlier releases support up to 8 alphanumeric characters.S e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.Configuring NTPThis example shows how to configure the device to synchronize only to time sources that provide authentication key 42 in their NTP packets:switch# config tEnter configuration commands, one per line. End with CNTL/Z.switch(config)# ntp authentication-key 42 md5 aNiceKey switch(config)# ntp trusted-key 42switch(config)# ntp authenticateswitch(config)# copy running-config startup-config [########################################] 100%switch(config)#Configuring NTP Access RestrictionsYou can control access to NTP services by using access groups. Specifically, you can specify the types of requests that the device allows and the servers from which it accepts responses.If you do not configure any access groups, NTP access is granted to all devices. If you configure any access groups, NTP access is granted only to the remote device whose source IP address passes the access list criteria.BEFORE YOU BEGINMake sure that you are in the correct VDC. To change the VDC, use the switchto vdc command.Step 3show ntp authentication-keysExample:switch(config)# show ntp authentication-keys(Optional) Displays the configured NTP authentication keys.Step 4[no ] ntp trusted-key numberExample:switch(config)# ntp trusted-key 42Specifies one or more keys (defined in Step 2) that a time source must provide in its NTPpackets in order for the device to synchronize to it. The range for trusted keys is from 1 to 65535. This command provides protection against accidentally synchronizing the device to a time source that is not trusted.Step 5show ntp trusted-keysExample:switch(config)# show ntp trusted-keys(Optional) Displays the configured NTP trusted keys.Step 6[no ] ntp authenticateExample:switch(config)# ntp authenticateEnables or disables the NTP authentication feature. NTP authentication is disabled by default.Step 7show ntp authentication-status Example:switch(config)# show ntp authentication-status(Optional) Displays the status of NTP authentication.Step 8copy running-config startup-config Example:switch(config)# copy running-config startup-config(Optional) Saves the change persistently through reboots and restarts by copying the running configuration to the startup configuration.CommandPurposeS e n d d o c u m e n t c o m m e n t s t o n e x u s7k-d o c f e e d b a ck@c i s c o.c o m.Configuring NTPSUMMARY STEPS1.config t2.[no] ntp access-group {peer | serve | serve-only | query-only} access-list-name3.(Optional) show ntp access-groups4.(Optional) copy running-config startup-configDETAILED STEPSCommand PurposeStep1config tExample:switch# config tEnter configuration commands, one per line.End with CNTL/Z.switch(config)#Places you in global configuration mode.Step2[no] ntp access-group {peer | serve | serve-only | query-only} access-list-nameExample:switch(config)# ntp access-group peeraccesslist1Creates or removes an access group to control NTP access and applies a basic IP access list. The access group options are scanned in the following order, from least restrictive to most restrictive:•The peer keyword enables the device to receive time requests and NTP controlqueries and to synchronize itself to theservers specified in the access list.•The serve keyword enables the device to receive time requests and NTP controlqueries from the servers specified in theaccess list but not to synchronize itself to the specified servers.•The serve-only keyword enables the device to receive only time requests from serversspecified in the access list.•The query-only keyword enables the device to receive only NTP control queries from the servers specified in the access list.Step3show ntp access-groupsExample:switch(config)# show ntp access-groups (Optional) Displays the NTP access group configuration.Step4copy running-config startup-configExample:switch(config)# copy running-configstartup-config (Optional) Saves the change persistently through reboots and restarts by copying the running configuration to the startup configuration.S e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.Configuring NTPThis example shows how to configure the device to allow it to synchronize to a peer from access group “accesslist1”:switch# config tswitch(config)# ntp access-group peer accesslist1switch(config)# show ntp access-groups Access List Type-----------------------------accesslist1 Peerswitch(config)# copy running-config startup-config [########################################] 100%switch(config)#Configuring the NTP Source IP AddressNTP sets the source IP address for all NTP packets based on the address of the interface through which the NTP packets are sent. You can configure NTP to use a specific source IP address.To configure the NTP source IP address, use the following command in global configuration mode:Configuring the NTP Source InterfaceYou can configure NTP to use a specific interface.To configure the NTP source interface, use the following command in global configuration mode:Configuring NTP LoggingYou can configure NTP logging in order to generate system logs with significant NTP events. NTP logging is disabled by default.BEFORE YOU BEGINMake sure that you are in the correct VDC. To change the VDC, use the switchto vdc command.CommandPurpose[no ] ntp source ip-addressExample :switch(config)# ntp source 192.0.2.1Configures the source IP address for all NTP packets. The ip-address can be in IPv4 or IPv6 format.CommandPurpose[no ] ntp source-interface interface Example :switch(config)# ntp source-interface ethernet 2/1Configures the source interface for all NTP packets. Use the ? keyword to display a list of supported interfaces.S e n d d o c u m e n t c o m m e n t s t o n e x u s 7k -d o c f e e d b a ck @c i s c o.c o m.Configuring NTPSUMMARY STEPS1.config t2.[no ] ntp logging3.(Optional) show ntp logging-status4.(Optional) copy running-config startup-configDETAILED STEPSThis example shows how to enable NTP logging in order to generate system logs with significant NTP events:switch# config tswitch(config)# ntp loggingswitch(config)# copy running-config startup-config [########################################] 100%switch(config)#Enabling CFS Distribution for NTPYou can enable CFS distribution for NTP in order to distribute the NTP configuration to other CFS-enabled devices.BEFORE YOU BEGINMake sure that you have enabled CFS distribution for the device using the “Configuring CFS Distribution” section on page 2-6.CommandPurposeStep 1config tExample:switch# config tEnter configuration commands, one per line. End with CNTL/Z.switch(config)#Places you in global configuration mode.Step 2[no ] ntp loggingExample:switch(config)# ntp loggingEnables or disables system logs to be generated with significant NTP events. NTP logging is disabled by default.Step 3show ntp logging-statusExample:switch(config)# show ntp logging-status(Optional) Displays the NTP logging configuration status.Step 4copy running-config startup-config Example:switch(config)# copy running-config startup-config(Optional) Saves the change persistently through reboots and restarts by copying the running configuration to the startup configuration.。

Cisco Nexus 7000系列产品资料

Cisco Nexus 7000系列产品资料

产品资料1 核心交换机Cisco Nexus 7000系列机箱产品概述Cisco Nexus™ 7000系列交换机最大限度地集成可扩展性和运营灵活性。

Cisco Nexus 7000系列交换机是一个模块化数据中心级产品系列,适用于高度可扩展的万兆以太网网络,其交换矩阵架构的速度能扩展至15Tbps以上。

它的设计旨在满足大多数关键任务数据中心的要求,提供永续的系统运营和无所不在的虚拟化服务。

Cisco Nexus 7000系列建立在一个成熟的操作系统上,借助增强特性提供实时系统升级,以及出色的可管理性和可维护性。

它的创新设计专门用于支持端到端数据中心连接,将IP、存储和IPC(进程间通讯)网络整合到单一以太网交换架构之上。

作为第一款数据中心级交换平台,Cisco Nexus 7000系列(图1)提供集成永续性,以及专为数据中心可用性、可靠性、可扩展性和易管理性而优化的特性。

图1. Cisco Nexus 7000系列特性和优势在Cisco® NX-OS软件的支持下,Cisco Nexus 7000系列提供一系列丰富的特性,保证系统的永续运营。

有两种机箱外型可用。

∙前后通风,带10个前面板接入的垂直模块插槽和一个集成电缆管理系统,能够支持新老设施中的安装、运营和冷却。

∙18个前操作模块插槽,具有端到端通风能力,紧凑水平的外型,以及特别设计的集成线缆系统,方便操作并降低复杂性。

∙面向数据中心的高可靠性和最高可用性设计,所有接口和控制引擎模块都采取前面板接入,冗余电源、风扇和交换矩阵模块则完全采用后端接入,以确保维护过程中布线不受影响。

∙系统采用两个专用控制引擎模块;可扩展、完全分布式的交换矩阵架构最多能容纳5个后端安装的交换矩阵模块,配合机箱背板设计,整个系统能提供每插槽最高230 Gbps带宽,使10插槽外型机箱可提供7 Tbps转发能力,18插槽外型机箱可提供15 Tbps转发能力。

∙中板平面设计支持随您的需求变化进行灵活的技术升级,以及提供持续的投资保护。

配置 XL 选项的Cisco Nexus 7000 M1 系列32 端口万兆以太网模块

配置 XL 选项的Cisco Nexus 7000 M1 系列32 端口万兆以太网模块

产品手册配置 XL 选项的 Cisco Nexus 7000 M1 系列 32 端口万兆以太网模块产品概述配置 XL 选项的 Cisco Nexus® 7000 M1 系列 32 端口万兆以太网模块(图 1)是一款可高度扩展的高性能模块,专为任务关键型以太网网络而设计。

该模块使用 M1-XL 转发引擎,其特点是利用较大的转发信息库 (FIB)。

该模块还支持包括 Twinax CX1 在内的各种增强型小型封装热插拔 (SFP+) 收发器,可在各种类型的网络环境中灵活部署。

Cisco Nexus 7000 系列交换机是一个模块化数据中心级产品系列,专为可高度扩展的万兆以太网而设计,其交换矩阵架构的速度能扩展至 15 Tbps 以上,可支持高密度 40 和 100 千兆以太网部署。

该系列旨在满足大多数任务关键型网络环境的要求,可提供持续的系统运行和虚拟化普及服务。

Cisco Nexus 7000 系列以业界认可的思科® NX-OS 软件操作系统为基础,具备多种强化功能,凭借出众的可管理性和适用性来完成实时系统升级任务。

其统一交换矩阵的创新设计专用于支持将 IP、存储和进程间通信 (IPC) 网络整合到单一以太网交换矩阵之上。

图 1. 配置 XL 选项的 Cisco Nexus 7000 M1 系列 32 端口万兆以太网模块特性和优势配置 XL 选项的 Cisco Nexus 7000 M1 系列 32 端口万兆以太网模块具备诸多主要功能,旨在为要求最高性能和全面功能集的环境提供灵活的部署和支持。

此模块配备可选的可扩展功能许可证,可以在增强的 XL 模式下运行,从而能够使用完整的转发表,尤其适用于互联网对等连接环境等大规模部署。

更大的 FIB 表可利用虚拟路由和转发 (VRF) 以及虚拟设备环境 (VDC) 技术,支持在面向互联网的部署中使用完整互联网路由表的多个副本。

此模块能够在非 XL 或 XL 模式下运行,因此具有能够适应多种网络环境的灵活性,无需更改或升级硬件模块,同时还能降低总拥有成本(TCO)。

思科新一代数据中心级交换机中文配置向导Nexus7000

思科新一代数据中心级交换机中文配置向导Nexus7000

Nexus Configuration Simple Guide目录Nexu7000缺省端口配置 (2)CMP连接管理处理器配置 (3)带外管理VRF (4)划分Nexus 7010 VDC (5)基于EthernetChannel的vPC (7)割裂的vPC:HSRP和STP (11)vPC的细部配置 (12)Nexus的SPAN (13)VDC的MGMT接口 (13)DOWN的VLAN端口 (13)Nexus的路由 (14)Nexus上的NLB (15)标识一个部件 (15)Nexus7000基本配置汇总 (16)Cisco NX-OS/IOS Configuration Fundamentals Comparison (16)Cisco NX-OS/IOS Interface Comparison (24)Cisco NX-OS/IOS Port-Channel Comparison (30)Cisco NX-OS/IOS HSRP Comparison (35)Cisco NX-OS/IOS STP Comparison (40)Cisco NX-OS/IOS SPAN Comparison (44)Cisco NX-OS/IOS OSPF Comparison (49)Cisco NX-OS/IOS Layer-3 Virtualization Comparison (54)vPC Role and Priority (61)vPC Domain ID (62)vPC Peer Link (62)Configuration for single 10 GigE Card (62)CFSoE (64)vPC Peer Keepalive or FT Link (64)vPC Ports (64)Orphan Ports with non-vPC VLANs (65)HSRP (66)HSRP Configuration and Best Practices for vPC (66)Advertising the Subnet (67)L3 Link Between vPC Peers (67)Cisco NX-OS/IOS TACACS+, RADIUS, and AAA Comparison (68)Nexus5000的配置同步 (73)初始化Nexus 2000 Fabric Module (75)Nexu7000缺省端口配置缺省时所有端口是关闭的no system default switchport shutdowncopy running-config startup-config vdc-all 存配置dir bootflash:dir bootflash://sup-standby/dir bootflash://sup-remoteshow roleshow inventory显示系统详细目录,或称为存货清单,可以看到各组件产品编号以及序列号show hardware 显示系统硬件详细信息show sprom backplane 1 显示交换机序列号show environment power 显示电源信息power redundancy-mode ps-redundant 如果没有双电网供电则使用此模式power redundancy-mode insrc-redundant 如果有双电网供电则使用此模式show module 检验各模块状态attach module slot_numberdir bootflash dir slot0:查看ACTIVE引擎的FLASH空间如果查看备份引擎的FLASH空间呢?首先attach module command to attach to the module number, and then use the dir bootflash: or dir slot0:out-of-service module slot Shutting Down a Supervisor or I/O Moduleout-of-service xbar slot Shutting Down a Fabric Moduleshow environmentshow environment temperatureshow environment fanbanner motd #Welcome to the switch#clock timezoneclock setreload 重启交换机reload module numberswitchto VDC切换至某VDC管理界面switchbackpoweroff module slot_numberno poweroff module slot_numberpoweroff xbar slot_numberCMP连接管理处理器配置CMP配置:You should also configure three IP addresses—one for each cmp-mgmt interface and one that is shared between the active and standby supervisor mgmt 0 interfaces.attach cmp 进入CMP命令输入后自动存盘,不需要copy run start通过NX-OS CLI来配置CMP1. configure terminal2. interface cmp-mgmt module slot 通过module 槽号分别为5/6来实现主备引擎上的CMP配置3. ip address ipv4-address/length4. ip default-gateway i pv4-address5. show running-config cmp通过CMP CLI来配置CMP1. attach cmp2. configure terminal3. ip default-gateway i pv4-address4. interface cmp-mgmt5. ip address ipv4-address/length6. show running-config在CMP上可执行的动作:show cp statereload cpattach cpmonitor cpping or traceroute 192.0.2.15reload system To reload the complete system, including the CMPs带外管理VRFManagement VRF and Basic ConnectivityThe management interface is, by default, part of the management VRF. The management interface “mgmt0” is the only interface allowed to be part of this VRF.The philosophy beyond Management VRF is to provide total isolation for the management trafficfrom the rest of the traffic flowing through the box by confining the former to its own forwarding table.In this step we will:- Verify that only the mgmt0 interface is part of the management VRF- Verify that no other interface can be part of the management VRF- Verify that the default gateway is reachable only using the management VRF如果想Ping 带外网管的网关等地址必须在Ping命令后面加上vrf managementping 10.2.8.1 vrf management划分Nexus 7010 VDCVDC是Nexus7000系列的特色功能。

思科Nexus_7000产品手册

思科Nexus_7000产品手册

15
用于光纤连接的2个I / O模块
46
46 Gbps
Fabric 1
46
Requires 43Gbps
46
92 Gbps
Fabric 2
46
230
48 Port 1GE SFP
46
138 Gbps
Fabric 3
46
46
Requires 80Gbps
184 Gbps
Fabric 4
46
230
46
187 磅
684 磅
10
模块顶杠杆
模块包含驱动杠杆,不仅帮助协调和安装模块,而且具有开关模块的功能 。如果两个模块同时按下,自动关闭模块的供电。
支持杠杆的模块:
管理引擎 交换矩阵 以太网
验证:
n7000# show Mod Ports --- ----1 32 module 1 Module-Type Model Status -------------------------------- ------------------ -----------10 Gbps Ethernet Module N7K-M132XP-12 ok
未来可支持的
高达8.2 Tbps的系统带宽(每槽230克)的功能模 块 可扩展到16 + Tbps的系统带宽
侧侧气流 所有组件冗余并支持热插拔 25U
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14
交换矩阵
交换矩阵I

Nexus 7010 Fabric module

cisconexus7000系列交换机

产品手册Cisco Nexus 7000 系列交换机产品概述Cisco Nexus® 7000 系列交换机兼具高水平的可扩展性和操作灵活性。

Cisco Nexus 7000 系列交换机为思科®统一交换矩阵奠定了坚实的基础。

该系列是一个模块化数据中心级产品系列,其交换矩阵架构的速度能扩展至 17 Tbps 以上,专为高度可扩展的 1/10/40/100 Gb 以太网网络而设计打造。

为了满足大多数关键任务数据中心的需求,这些交换机可持续为客户提供各种系统运行、虚拟化及综合性服务。

Cisco Nexus 7000 系列以业界认可的 Cisco NX-OS 软件操作系统为基础,具有多种强化功能,可凭借出众的可管理性和适用性,完成实时系统升级任务。

作为下一代交换平台的佼佼者,Cisco Nexus 7000 系列(图 1)具有集成的恢复力和若干专门针对数据中心优化的功能,实现可用性、可靠性、可扩展性和管理简便性。

图 1. Cisco Nexus 7000 系列特性和优势Cisco Nexus 7000 系列融合了 Cisco NX-OS,可提供全套功能,并且可在以下四种外形的机箱内实现不间断运行:●18 插槽机箱,机箱具有紧凑的卧式外形,内置 18 个前插式模块插槽和侧端气流通道,且设有专用的集成电缆管理系统。

●10 插槽机箱,内置 10 个前插式立式模块插槽与自前而后的气流通道,且设有集成电缆管理系统。

●9 插槽机箱,机箱具有紧凑的卧式外形,内置 9 个前插式模块插槽和侧端气流通道,且设有专用的集成电缆管理系统。

● 4 插槽机箱,机箱具有小巧的外形,均为前插式模块插槽及侧端到后端的气流通道,且设有专用的集成电缆管理系统。

4插槽机箱、9 插槽机箱、10 插槽机箱和 18 插槽机箱内管理引擎占两个插槽,Cisco Nexus 7000 管理引擎模块旨在使 Cisco Nexus 7000 系列机箱具有可扩展的控制平面和管理功能。

Cisco NX-OS 基础知识:终端设置和会话配置说明书

Configuring Terminal Settings and SessionsThis chapter describes how to manage the terminal settings and sessions on a Cisco NX-OS device.This chapter includes the following sections:•Information About Terminal Settings and Sessions,page1•Licensing Requirements for Terminal Settings and Sessions,page4•Configuring the Console Port,page4•Configuring the COM1Port,page5•Configuring Virtual Terminals,page7•Configuring Modem Connections,page9•Clearing Terminal Sessions,page13•Displaying Terminal and Session Information,page13•Default Settings for File System Parameters,page13•Additional References for Terminal Settings and Sessions,page14Information About Terminal Settings and SessionsThis section includes information about terminal settings and sessions.Terminal Session SettingsThe Cisco NX-OS software features allow you to manage the following characteristics of terminals:Terminal typeName used by Telnet when communicating with remote hostsLengthNumber of lines of command output displayed before pausingConfiguring Terminal Settings and Sessions Console PortWidthNumber of characters displayed before wrapping the lineInactive session timeoutNumber of minutes that a session remains inactive before the device terminates itConsole PortThe console port is an asynchronous serial port that allows you to connect to the device for initial configurationthrough a standard RS-232port with an RJ-45connector.Any device connected to this port must be capableof asynchronous transmission.You can configure the following parameters for the console port:Data bitsSpecifies the number of bits in an8-bit byte that is used for data.Inactive session timeoutSpecifies the number of minutes a session can be inactive before it is terminated.ParitySpecifies the odd or even parity for error detection.SpeedSpecifies the transmission speed for the connection.Stop bitsSpecifies the stop bits for an asynchronous line.Configure your terminal emulator with9600baud,8data bits,1stop bit,and no parity.COM1 PortA COM1port is an RS-232port with a DB-9interface that enables you to connect to an external serialcommunication device such as a modem.You can configure the following parameters for the COM1port:Data bitsSpecifies the number of bits in an8-bit byte that is used for data.Hardware flowcontrolEnables the flow-control hardware.ParitySpecifies the odd or even parity for error detection.SpeedSpecifies the transmission speed for the connection.Stop bitsSpecifies the stop bits for an asynchronous line.Configure your terminal emulator with 9600baud,8data bits,1stop bit,and no parity.Virtual TerminalsYou can use virtual terminal lines to connect to your Cisco NX-OS device.Secure Shell (SSH)and Telnet create virtual terminal sessions.You can configure an inactive session timeout and a maximum sessions limit for virtual terminals.Modem SupportYou can connect a modem to the COM1or console ports on the supervisor module.The following modems were tested on devices running the Cisco NX-OS software:•MultiTech MT2834BA (/en_us/support/families/multimodemii/)•Hayes Accura V .92(/products/dial_up_external_serial.html#hayes)Do not connect a modem when the device is booting.Only connect the modem when the device is powered-up.NoteThe Cisco NX-OS software has the default initialization string (ATE0Q1&D2&C1S0=1\015)to detect connected modems.The default string is defined as follows:ATAttention E0(required)No echo Q1Result code on &D2Normal data terminal ready (DTR)option &C1Enable tracking the state of the data carrier S0=1Pick up after one ring \015(required)Carriage return in octalConfiguring Terminal Settings and SessionsVirtual TerminalsLicensing Requirements for Terminal Settings and SessionsThe following table shows the licensing requirements for this feature:License RequirementProduct Terminal setting configuration requires no license.Any feature not included in a license package is bundled with the Cisco NX-OS system images and is provided at no extra charge to you.For a complete explanation of the Cisco NX-OS licensing scheme,see the .Cisco NX-OSConfiguring the Console PortYou can set the following characteristics for the console port:•Data bits•Inactive session timeout •Parity •Speed •Stop bitsBefore You Begin Log in to the console port.ProcedurePurposeCommand or ActionEnters global configuration mode.configure terminalExample:switch#configure terminal switch(config)#Step 1Enters console configuration mode.line consoleExample:switch#line console switch(config-console)#Step 2Configures the number of data bits per byte.The range is from 5to 8.The default is 8.databits bitsExample:switch(config-console)#databits 7Step 3Configuring Terminal Settings and SessionsLicensing Requirements for Terminal Settings and SessionsPurposeCommand or ActionConfigures the timeout for an inactive session.The range is from 0to 525600minutes (8760exec-timeout minutesExample:switch(config-console)#exec-timeout 30Step 4hours).A value of 0minutes disables the session timeout.The default is 0minutes.Configures the parity.The default is none .parity {even |none |odd }Example:switch(config-console)#parity evenStep 5Configures the transmit and receive speed.The default is 115200.speed {300|1200|2400|4800|9600|38400|57600|115200}Example:switch(config-console)#speed 115200Step 6Configures the stop bits.The default is 1.stopbits {1|2}Example:switch(config-console)#stopbits 2Step 7Exits console configuration mode.exitExample:switch(config-console)#exitswitch(config)#Step 8(Optional)Displays the console settings.show line consoleExample:switch(config)#show line consoleStep 9(Optional)Copies the running configuration to the startup configuration.copy running-config startup-configExample:switch(config)#copy running-config startup-configStep 10Configuring the COM1 PortYou can set the following characteristics for the COM1port:•Data bits•Flow control on the hardware •Parity •Speed •Stop bitsConfiguring Terminal Settings and SessionsConfiguring the COM1 PortBefore You BeginLog in to the console port or COM1port.ProcedurePurposeCommand or ActionEnters global configuration mode.configure terminalExample:switch#configure terminal switch(config)#Step 1Enters COM1configuration mode.line com1Example:switch#line com1switch(config-com1)#Step 2Configures the number of data bits per byte.The range is from 5to 8.The default is 8.databits bitsExample:switch(config-com1)#databits 7Step 3Enables flow control on the hardware.The default is enabled.flowcontrol hardwareExample:switch(config-com1)#flowcontrol hardwareStep 4Use the no flowcontrol hardware command to disable flow control on the hardware.Configures the parity.The default is none .parity {even |none |odd }Example:switch(config-com1)#parity evenStep 5Configures the transmit and receive speed.The default is 9600.speed {300|1200|2400|4800|9600|38400|57600|115200}Example:switch(config-com1)#speed 115200Step 6Configures the stop bits.The default is 1.stopbits {1|2}Example:switch(config-com1)#stopbits 2Step 7Exits COM1configuration mode.exitExample:switch(config-com1)#exitswitch(config)#Step 8(Optional)Displays the COM1port settings.show line com1Example:switch(config)#show line com1Step 9Configuring Terminal Settings and SessionsConfiguring the COM1 PortPurposeCommand or Action(Optional)Copies the running configuration to the startup configuration.copy running-config startup-configExample:switch(config)#copy running-config startup-configStep 10Configuring Virtual TerminalsThis section describes how to configure virtual terminals on Cisco NX-OS devices.Configuring the Inactive Session TimeoutYou can configure a timeout for inactive virtual terminal sessions on a Cisco NX-OS device.ProcedurePurposeCommand or ActionEnters global configuration mode.configure terminalExample:switch#configure terminal switch(config)#Step 1Enters line configuration mode.line vtyExample:switch#line vtyswitch(config-line)#Step 2Configures the inactive session timeout.The range is from 0to 525600minutes (8760exec-timeout minutesExample:switch(config-line)#exec-timeout 30Step 3hours).A value of 0minutes disables the timeout.The default value is 0.Exits line configuration mode.exitExample:switch(config-line)#exit switch(config)#Step 4(Optional)Displays the virtual terminal configuration.show running-config all |begin vtyExample:switch(config)#show running-config all |begin vtyStep 5Configuring Terminal Settings and SessionsConfiguring Virtual TerminalsPurposeCommand or Action(Optional)Copies the running configuration to the startup configuration.copy running-config startup-configExample:switch(config)#copy running-config startup-configStep 6Configuring the Session LimitYou can limit the number of virtual terminal sessions on your Cisco NX-OS device.ProcedurePurposeCommand or ActionEnters global configuration mode.configure terminalExample:switch#configure terminal switch(config)#Step 1Enters line configuration mode.line vtyExample:switch#line vtyswitch(config-line)#Step 2Configures the maximum number of virtual sessions for the Cisco NX-OS device.The range is from 1to 60.The default is 32.session-limit sessionsExample:switch(config-line)#session-limit 10Step 3Exits line configuration mode.exitExample:switch(config-line)#exit switch(config)#Step 4(Optional)Displays the virtual terminal configuration.show running-config all |being vtyExample:switch(config)#show running-config all |begin vtyStep 5(Optional)Copies the running configuration to the startup configuration.copy running-config startup-configExample:switch(config)#copy running-config startup-configStep 6Configuring Terminal Settings and SessionsConfiguring the Session LimitConfiguring Modem ConnectionsYou can connect a modem to either the COM1port or the console port.We recommend that you use the COM1port to connect the modem.Enabling a Modem ConnectionYou must enable the modem connection on the port before you can use the modem.Before You Begin Log in to the console port.ProcedurePurposeCommand or ActionEnters global configuration mode.configure terminalExample:switch#configure terminal switch(config)#Step 1Enters COM1configuration mode or console configuration mode.Enter one of the following commands:PurposeCommand Step 2Enters COM1configuration mode.line com1Enters console configuration mode.line consoleExample:switch#line com1switch(config-com1)#Enables modem input on the COM1or console port.modem inExample:switch(config-com1)#modem inStep 3Exits COM1or console configuration mode.exitExample:switch(config-com1)#exit switch(config)#Step 4(Optional)Displays the console and COM1settings.show lineExample:switch(config)#show lineStep 5Configuring Terminal Settings and SessionsConfiguring Modem ConnectionsPurposeCommand or Action(Optional)Copies the running configuration to the startup configuration.copy running-config startup-configExample:switch(config)#copy running-config startup-configStep 6Downloading the Default Initialization StringThe Cisco NX-OS software provides a default initialization string that you can download for connecting with the modem.The default initialization string is ATE0Q1&D2&C1S0=1\015.Before You Begin Log in to the console port.ProcedurePurposeCommand or ActionEnters global configuration mode.configure terminalExample:switch#configure terminal switch(config)#Step 1Enter one of the following commands:Step 2DescriptionOption Enters COM1configuration mode.line com1Enters console configuration mode.line consoleExample:switch#line com1switch(config-com1)#Writes the default initialization string to the modem.modem init-string defaultExample:switch(config-com1)#modem init-string defaultStep 3Exits COM1or console configuration mode.exitExample:switch(config-com1)#exit switch(config)#Step 4Configuring Terminal Settings and SessionsDownloading the Default Initialization StringPurposeCommand or Action(Optional)Displays the COM1and console settings.show lineExample:switch(config)#show lineStep 5(Optional)Copies the running configuration to the startup configuration.copy running-config startup-configExample:switch(config)#copy running-config startup-configStep 6Configuring and Downloading a User-Specified Initialization StringYou can configure and download your own initialization when the default initialization string is not compatible with your modem.Before You Begin Log in to the console port.ProcedurePurposeCommand or ActionEnters global configuration mode.configure terminalExample:switch#configure terminal switch(config)#Step 1Enter one of the following commands:Step 2DescriptionOption Enters COM1configuration mode.line com1Enters console configuration mode.line consoleExample:switch#line com1switch(config-com1)#Sets the user-specified initialization string for the COM1or console port.The initialization modem set-string user-input stringExample:switch(config-com1)#modem set-string user-input ATE0Q1&D2&C1S0=3\015Step 3string is alphanumeric and case sensitive,can contain special characters,and has a maximum of 100characters.Configuring and Downloading a User-Specified Initialization StringPurposeCommand or Action You must first set the user-input string before initializing the string.NoteWrites the user-specified initialization string to the modem connected to the COM1or console port.modem init-string user-inputExample:switch(config-com1)#modem init-string user-inputStep 4Exits COM1or console configuration mode.exitExample:switch(config-com1)#exit switch(config)#Step 5(Optional)Displays the COM1and console settings.show lineExample:switch(config)#show lineStep 6(Optional)Copies the running configuration to the startup configuration.copy running-config startup-configExample:switch(config)#copy running-config startup-configStep 7Initializing a Modem for a Powered-Up Cisco NX-OS DeviceIf you connect a modem to a powered-up physical device,you must initialize the modem before you can use it.Before You BeginAfter waiting until the Cisco NX-OS device has completed the boot sequence and the system image is running,connect the modem to either the COM1port or the console port on the device.Enable the modem connection on the port.ProcedurePurposeCommand or ActionInitializes the modem connected to the device.modem connect line {com1|console }Example:switch#modem connect line com1Step 1Initializing a Modem for a Powered-Up Cisco NX-OS DeviceClearing Terminal SessionsRelated TopicsEnabling a Modem Connection,on page9Clearing Terminal SessionsYou can clear terminal sessions on the Cisco NX-OS device.ProcedureCommand or ActionPurposeshow users(Optional)Step 1Displays the user sessions on the device.Example:switch#show usersClears a terminal session on a specific line.Theclear line nameStep 2line name is case sensitive.Example:switch#clear line pts/0Displaying Terminal and Session InformationTo display terminal and session information,perform one of the following tasks:PurposeCommandshow terminalDisplays terminal settings.show lineDisplays the COM1and console ports settings.show usersDisplays virtual terminal sessions.show running-config[all]Displays the user account configuration in the runningconfiguration.The all keyword displays the defaultvalues for the user accounts.For detailed information about the fields in the output from these commands,see the.Default Settings for File System ParametersThis table lists the default settings for the file system parameters.Table 1: Default File System SettingsDefault Parameters bootflash:Default filesystemAdditional References for Terminal Settings and SessionsThis section includes additional references for terminal settings and sessions on NX-OS devices.Related Documents for Terminal Settings and SessionsDocument TitleRelated Topic Cisco NX-OS Licensing Guide LicensingCisco Nexus 3000Command ReferenceCommand referenceAdditional References for Terminal Settings and Sessions。

Nexus7000 产品技术培训


Cisco Confidential
11
Agenda
交换矩阵的考量 线路卡的考量 主控卡的考量
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
集成的转发引擎: 集成的转发引擎: EARL8
Two 23G channels per slot One 23G channel per supervisor slot
Load-sharing across all fabric modules in chassis Multilevel redundancy with graceful performance degredation Non-disruptive OIR Blue Locator ID LED for easy location
SP DWRR DWRR DWRR
Unicast
SP
4:1 Mux
4:1 Mux
WRED WRED DWRR
e1/1
e1/3
e1/5
e1/7
e1/9
e1/11
e1/13 e1/15
WRED
Multicast
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Port ASIC 1
Port ASIC 1
Port ASIC 1
4:1 Mux
Module 1
e1/7 e2/1
4:1 Mux
Module 2
e2/7 e3/1
4:1 Mux

cisco 7000 系列交换机系统安全软件最终用户许可协议说明书

最终用户许可协议本附录包含以下部分:•思科系统公司最终用户许可协议,第1页•思科系统公司内容安全软件最终用户补充许可协议,第6页思科系统公司最终用户许可协议重要提示:请认真阅读本最终用户许可协议。

很重要的一点是,您应确认是从授权来源购买思科软件或设备,并且您或您所代表的实体(统称为“客户”)已经注册成为思科最终用户许可协议中规定的最终用户。

如您还未注册成为最终用户,则无权使用本软件。

本最终用户许可协议中的有限担保条款对您不适用。

如您是从已授权的渠道购买了本软件,一旦下载、安装或使用思科或思科供应软件即构成接受本协议。

许可本软件的思科系统公司或其分公司(统称为“思科”)愿意授予您本软件许可,但前提是您必须从授权渠道购买软件并且接受本最终用户协议中的全部条款以及补充许可协议(随产品一同交付或在订购时提供)中的其他许可限制要求(统称为“协议”)。

如果最终用户许可协议与补充许可协议之间存在任何冲突,应以补充许可协议为准。

下载、安装或使用本软件即表示您确认您是从授权渠道购买的本软件并同意受本协议的约束。

若您不同意本协议全部条款,则思科不愿意授予您本软件许可,因此(a)您不得下载、安装或使用本软件;和(b)您可退还本软件(包括未启封的CD包和所有书面资料)并获得全额退款。

或者,如果本软件与书面材料构成其他产品的组成部分,您可退还全部产品并获得全额退款。

只有原始及注册最终用户购买者才享有退货与退款权利,并且该权利从授权渠道购买产品后30天失效。

在本最终用户许可协议中,“获批来源”指A)思科;或(B)经思科授权在您所在大区内向最终用户分销/出售思科设备、软件和服务的分销商或系统集成商;或(C)由任何该等分销商或系统集成商根据与思科签署的分销商协议条款授权在您所在大区内向最终用户分销/出售思科设备、软件和服务的经销商。

本协议下述条款管辖客户对本软件(定义如下)的使用,除非(a)客户与思科签订了单独协议以管理客户对本软件的使用;或(b)本软件包含了单独的“单击接受”许可协议或第三方许可协议,作为安装或下载流程的组成部分以管理客户对本软件的使用。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

A
aaa accounting default SEC-1
action policy-default action reload SM-13
Cisco Nexus 7000 Series NX-OS Command Reference Master Index, Release 5.x Cisco Nexus 7000 Series NX-OS Command Reference Master Index, Release 5.x
aaa authentication cts default group aaa authentication dot1x default group aaa authentication eou default group aaa authentication login chap enable aaa authentication login console aaa authentication login default
1
Index
action snmp-trap action syslog address (VRRP)
SM-14 L3-1 L3-3 L3-6 L3-8 L3-11 L3-12 L3-15
auto-cost (OSPF) auto-cost (OSPFv3) autonomous-system
L3-58 L3-60 L3-62
Page Number Designators
FND HA IF L2 L3 MCR QOS SEC SM VDC Cisco Nexus 7000 Series NX-OS Fundamentals Command Reference, Release 5.x Cisco Nexus 7000 Series NX-OS High Availability Command Reference, Release 5.x Cisco Nexus 7000 Series NX-OS Interfaces Command Reference, Release 5.x Cisco Nexus 7000 Series NX-OS Layer 2 Switching Command Reference, Release 5.x Cisco Nexus 7000 Series NX-OS Unicast Routing Command Reference, Release 5.x Cisco Nexus 7000 Series NX-OS Multicast Routing Command Reference, Release 5.x Cisco Nexus 7000 Series NX-OS Quality of Service Command Reference, Release 5.x Cisco Nexus 7000 Series NX-OS Security Command Reference, Release 5.x Cisco Nexus 7000 Series NX-OS System Management Command Reference, Release 5.x Cisco Nexus 7000 Series NX-OS Virtual Device Context Command Reference, Release 5.x
cdp format device-id SM-32 SM-34
authentication-key (OSPF virtual link)
Cisco Nexus 7000 Series NX-OS Command Reference Master Index, Release 5.x
2
OL-23059-01
Index
cfs ipv4 cfs ipv6 cfs region
SM-35 SM-37 SM-39 IF-17 SM-41 QOS-7 QOS-9
clear hardware ip verify address clear hardware ip verify length clear hardware rate-limiter clear install all failed-standby clear install failure-reason clear ip access-list counters clear ip adjacency statistics clear ip arp SEC-47 QOS-13 L3-85 clear ip arp inspection log clear ip bgp L3-86 L3-87 L3-88 SEC-64 SEC-45
VDC-1 L3-20 L3-22 L3-23 L3-26
bfd
IF-5
bfd echo bfd interval bfd per-link
bfd optimize subinterfaces bfd slow-timer blink SM-20 boot auto-copy boot kickstart boot system boot-order
INDEX
Cisco Nexus 7000 Series NX-OS Command Reference Master Index, Release 5.x
September 3, 2010
aaห้องสมุดไป่ตู้ accounting dot1x
SEC-3 SEC-5 SEC-7 SEC-9 SEC-11 SEC-12
L3-24
L3-33 L3-35 L3-37 L3-39
L3-34
area virtual-link (OSPF) area virtual-link (OSPFv3) arp access-list attach module SEC-41 FND-2
C
callhome SM-24 SM-26 SM-27 IF-15 SM-28 SM-29 SM-30 SM-31 SM-33
SEC-27 SEC-29
abort (Session Manager) accept-lifetime
action counter
action event-default action exceptionlog action forceshut action overbudgetshut
SM-10
L3-80 L3-82 FND-13
SEC-57 FND-14 SEC-59 L3-84 SEC-61 SEC-62
channel-group check logflash checkpoint
SM-42
class (policy map type qos) class (policy map)
class type queuing (policy map type queuing) class-map type control-plane class-map type qos QOS-11 SEC-49
address-family (OSPFv3) address-family (RIP) advertise-map L3-13 L3-17
QOS-2
advertisement-interval (VRRP) aggregate-address alert-group SM-17
allocate interface ethernet area authentication (OSPF) area default-cost (OSPF) area default-cost (OSPFv3) area filter-list (OSPF) area filter-list (OSPFv3) area nssa (OSPF) area nssa (OSPFv3) area range (OSPF) area range (OSPFv3) area stub (OSPF) area stub (OSPFv3) L3-28 L3-30 L3-32
callhome send L3-41 L3-43 SEC-43 L3-45 L3-48 L3-50 L3-52 L3-55 L3-47 callhome test carrier-delay cd FND-10 cdp advertise cdp enable cdp holdtime cdp timer cfs eth cfs distribute
authentication (GLBP) authentication (HSRP) authentication (LDAP) authentication (VRRP)
authentication (OSPF virtual link) authentication key-chain (EIGRP) authentication key-chain (IS-IS) authentication mode (EIGRP) authentication-check authentication-type L3-53 L3-56
SM-15
address-family (BGP) address-family (EIGRP) address-family (IS-IS)
B
bandwidth (interface) bandwidth (QoS) banner motd beacon bestpath IF-4 L3-63 IF-7 IF-9 IF-11 IF-12 IF-13 FND-5 FND-6 FND-8 VDC-3 bandwidth remaining FND-3 IF-2 QOS-5
aaa authentication login ascii-authentication SEC-13 SEC-15
This index contains an alphabetical list of all the commands documented for Cisco NX-OS. Use the Alphabet Key or your web browser’s Find function to search for a command. To access the documentation for a particular command, click on the command name. Although the PDF file for the Command Reference Master Index contains active links to the online command pages, the PDF file is intended to be used as a printed document.
相关文档
最新文档