Cisco MDS 9000 Family Secure Erase Configuration Guide

Size: px
Start display at page:

Download "Cisco MDS 9000 Family Secure Erase Configuration Guide"

Transcription

1 Cisco MDS 9000 Family Secure Erase Configuration Guide For Cisco MDS 9500 and 9200 Series Cisco MDS 9000 NX-OS Release 5.0(1a) February 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA USA Tel: NETS (6387) Fax: Text Part Number: OL

2 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB s public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Nurse Connect, Cisco Pulse, Cisco SensorBase, Cisco StackPower, Cisco StadiumVision, Cisco TelePresence, Cisco Unified Computing System, Cisco WebEx, DCE, Flip Channels, Flip for Good, Flip Mino, Flipshare (Design), Flip Ultra, Flip Video, Flip Video (Design), Instant Broadband, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn, Cisco Capital, Cisco Capital (Design), Cisco:Financed (Stylized), Cisco Store, Flip Gift Card, and One Million Acts of Green are service marks; and Access Registrar, Aironet, AllTouch, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Lumin, Cisco Nexus, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Continuum, EtherFast, EtherSwitch, Event Center, Explorer, Follow Me Browsing, GainMaker, ilynx, IOS, iphone, IronPort, the IronPort logo, Laser Link, LightStream, Linksys, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, PCNow, PIX, PowerKEY, PowerPanels, PowerTV, PowerTV (Design), PowerVu, Prisma, ProConnect, ROSA, SenderBase, SMARTnet, Spectrum Expert, StackWise, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0910R) 2010 Cisco Systems, Inc. All rights reserved.

3 CONTENTS New and Changed Information vii Preface ix Audience ix Organization ix Document Conventions x Related Documentation xi Release Notes xi Compatibility Information xi Regulatory Compliance and Safety Information xi Hardware Installation xi Cisco Fabric Manager xi Command-Line Interface xii Intelligent Storage Networking Services Configuration Guides Troubleshooting and Reference xii Installation and Configuration Notes xii Obtaining Documentation and Submitting a Service Request xii xii CHAPTER 1 About Secure Erase 1-1 Secure Erase Job 1-2 Secure Erase Session 1-2 Concepts and Terminology 1-3 Features and Capabilities 1-4 Requirements and Prerequisites 1-5 Software Requirements 1-5 Hardware Requirements 1-5 Software Licenses 1-5 CHAPTER 2 Configuration Overview 2-1 Configuration Process 2-1 Obtaining Information 2-2 Setting Up Cisco Secure Erase 2-3 Job Configuration 2-4 Recovering Secure Erase Configuration 2-5 iii

4 Contents CHAPTER 3 Provisioning Secure Erase on the MSM 3-1 Using the Secure Erase Pre-Configuration Wizard 3-3 Configuring MDS Modules for Secure Erase 3-5 Creating a Secure Erase Workflow Using Fabric Manager 3-13 Creating a Secure Erase Job Using Fabric Manager 3-14 Displaying Secure Erase Job Status 3-18 APPENDIX A Secure Erase CLI Command Reference A-1 add-session vsan A-2 add-step dynamic A-3 add-step static A-4 add-tgt vsan A-5 add-vi vsan A-6 empty A-8 secure-erase abort job A-9 secure-erase create algorithm A-10 secure-erase create job A-11 secure-erase create-vi vsan A-12 secure-erase destroy algorithm A-13 secure-erase destroy job A-14 secure-erase destroy-vi vsan A-15 secure-erase start job A-16 secure-erase stop job A-17 secure-erase validate job A-18 show secure-erase algorithm A-19 show secure-erase job A-21 show secure-erase job detail A-22 show secure-erase vsan A-23 iv

5 New and Changed Information Table 1 summarizes the new and changed features for the Cisco MDS 9000 Family Secure Erase Configuration Guide and tells you where they are documented. The table includes a brief description of each new feature and the release in which the change occurred. Note As of NX-OS Release 4.1(1), SAN-OS has been changed to NX-OS. References to SAN-OS releases before 4.1(1) still apply. Table 1 Documented Features for the Cisco MDS 9000 Family Secure Erase Configuration Guide, Release 5.x Feature Configuring Secure Erase Using Fabric Manager Description Added the Secure Erase Pre-Configuration Wizard. Added Creating Secure Erase Jobs Using Fabric Manager. Added Secure Erase Job Status View. Changed in Release 5.0(1a) Where Documented Chapter 3, Configuring Secure Erase Using Cisco Fabric Manager vii

6 New and Changed Information viii

7 Preface This preface describes the audience, organization, and conventions of the Cisco MDS 9000 Family Secure Erase Configuration Guide. It also provides information on how to obtain related documentation. Audience This guide is intended for experienced network administrators who are responsible for planning, installing, configuring, and maintaining Cisco MDS 9000 Secure Erase. Organization This document is organized as follows: Chapter Title Description Chapter 1 Product Overview Provides an overview of Cisco MDS Secure Erase. Chapter 2 Configuring Secure Erase Describes the installation, provisioning, and configuration tasks. Appendix A Secure Erase CLI Command Reference Syntax and usage guidelines for Cisco MDS Secure Erase CLI commands. ix

8 Preface Document Conventions Command descriptions use these conventions: boldface font italic font Commands and keywords are in boldface. Arguments for which you supply values are in italics. [ ] Elements in square brackets are optional. [ x y z ] Optional alternative keywords are grouped in brackets and separated by vertical bars. Screen examples use these conventions: screen font boldface screen font italic screen font Terminal sessions and information the switch displays are in screen font. Information you must enter is in boldface screen font. Arguments for which you supply values are in italic screen font. < > Nonprinting characters, such as passwords, are in angle brackets. [ ] Default responses to system prompts are in square brackets.!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line. This document uses the following conventions: Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual. Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. x

9 Preface Related Documentation The documentation set for the Cisco MDS 9000 Family includes the following documents. To find a document online, use the Cisco MDS SAN-OS Documentation Locator at: Release Notes Cisco MDS 9000 Family Release Notes for Cisco MDS SAN-OS Releases Cisco MDS 9000 Family Release Notes for Storage Services Interface Images Cisco MDS 9000 Family Release Notes for Cisco MDS 9000 EPLD Images Compatibility Information Cisco MDS 9000 SAN-OS Hardware and Software Compatibility Information Cisco MDS 9000 Family Interoperability Support Matrix Cisco MDS Storage Services Module Interoperability Support Matrix Cisco MDS SAN-OS Release Compatibility Matrix for Storage Service Interface Images Regulatory Compliance and Safety Information Regulatory Compliance and Safety Information for the Cisco MDS 9000 Family Hardware Installation Cisco MDS 9124 Multilayer Fabric Switch Quick Start Guide Cisco MDS 9500 Series Hardware Installation Guide Cisco MDS 9200 Series Hardware Installation Guide Cisco MDS 9100 Series Hardware Installation Guide Cisco Fabric Manager Cisco MDS 9000 Family Fabric Manager Quick Configuration Guide Cisco MDS 9000 Family Fabric Manager Configuration Guide Cisco MDS 9000 Family Fabric Manager Database Schema xi

10 Preface Command-Line Interface Cisco MDS 9000 Family Software Upgrade and Downgrade Guide Cisco MDS 9000 Family Storage Services Module Software Installation and Upgrade Guide Cisco MDS 9000 Family CLI Quick Configuration Guide Cisco MDS 9000 Family CLI Configuration Guide Cisco MDS 9000 Family Command Reference Intelligent Storage Networking Services Configuration Guides Cisco MDS 9000 Family Data Mobility Manager Configuration Guide Cisco MDS 9000 Family Storage Media Encryption Configuration Guide Troubleshooting and Reference Cisco MDS 9000 Family Troubleshooting Guide Cisco MDS 9000 Family MIB Quick Reference Cisco MDS 9000 Family SMI-S Programming Reference Cisco MDS 9000 Family System Messages Reference Installation and Configuration Notes Cisco MDS 9000 Family SSM Configuration Note Cisco MDS 9000 Family Port Analyzer Adapter Installation and Configuration Note Cisco 10-Gigabit X2 Transceiver Module Installation Note Cisco MDS 9000 Family CWDM SFP Installation Note Cisco MDS 9000 Family CWDM Passive Optical System Installation Note Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: Subscribe to the What s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0. xii

11 CHAPTER 1 Product Overview Cisco Secure Erase is a SAN-based product that erases existing data on a specific Logical Unit Number (LUN) on a storage array. The data erased using Secure Erase cannot be reconstructed. Cisco Secure Erase runs on the Cisco MDS /4-Port Multiservice Module (MSM-18/4 module) and MDS 9222i switch. The MSM-18/4 module and 9222i switch are together called as the Secure Erase node. The MSM-18/4 module must be installed on the Cisco MDS switch on which you want to run Cisco Secure Erase. This chapter includes the following sections: About Secure Erase, page 1-1 Concepts and Terminology, page 1-3 Features and Capabilities, page 1-4 Requirements and Prerequisites, page 1-5 About Secure Erase Cisco Secure Erase for the Cisco MDS 9500 or 9200 family of switches provides significant advantages over traditional data erase mechanisms. These advantages include platform independence, higher speed, lower cost, and easier deployment. Cisco Secure Erase uses special algorithms to erase data. These algorithms erase data by specifying pattern sequences that are repeatedly written to the target media. This process overcomes the traditional problem of data remanance. Cisco MDA 9000 Family Secure Erase Configuration Guide 1-1

12 About Secure Erase Chapter 1 Product Overview Figure 1-1 Cisco Secure Erase Topology Virtual Initiators on Secure Erase node FC FC Storage Arrays The Secure Erase feature runs on the MSM-18/4 module intelligent line card, which is responsible for managing the data erasing process. This process is executed by virtual initiators (VIs) created on the MSM-18/4 module. The host or servers connected to SAN the have no role in the data-erasing process. The storage ports can be connected anywhere in the SAN provided they are accessible from the switch where Cisco Secure Erase is running. Secure Erase Job A Secure Erase job contains information about the following: Target Enclosures where Secure Erase functions are performed. A single target enclosure can be made up of multiple ports spanning multiple VSANs. Storage port(s) coming out of the Storage Enclosure. These storage ports can belong to separate VSANs. VIs that will execute Secure Erase operations. Like target ports, a job also contains VIs that are part of different VSANs. Secure Erase sessions. All actions such as start, stop, abort, and validate are performed at the job level. These actions impact all sessions in a job. Secure Erase Session A Secure Erase session is a unit of erase that is defined by the following parameters: Target LUN(s) where Secure Erase needs to be performed. Storage port with which you would access the above mentioned LUN. Secure Erase algorithm to be used for the erase procedure. Virtual Initiator is selected out of the VIs available in the job automatically. The selection is based on a load-balancing algorithm. 1-2 Cisco MDA 9000 Family Secure Erase Configuration Guide

13 Chapter 1 Product Overview Concepts and Terminology Concepts and Terminology Cisco Secure Erase uses the following concepts and terminologies: Secure Erase Cisco Secure Erase is a SAN-based feature that erases existing data on a specific target. The data erased through Secure Erase cannot be reconstructed. Secure Erase Job Secure Erase job is an enclosure where multiple target ports and VIs that belong to different VSANs can be added. Secure Erase Session Secure Erase session is a unit of Secure Erase operation that contains the target and algorithms to be used. Secure Erase Algorithm Secure Erase is based on erase algorithms recommended by the United States Department of Defense, the Royal Canadian Police and NIST algorithm recommended by the National Institute of Standards and Technology, agency of US Department of Commerce. Secure Erase algorithms specify a sequence of patterns to be written on physical media with the objective of erasing the data and overcoming the problem of data remanence. MSM An MSM-18/4 module is an MDS switch module that provides intelligent services. The Secure Erase feature is executed on the MSM-18/4 module. VI A VI is a Virtual Initiator residing on the MSM-18/4 module. LUN A Logical Unit Number (LUN) is a unit of storage that you can specify for Secure Erase. The LUN is only a unique number in the content of a storage port. FUA A FUA is a Force Unit Access bit. Secure Erase turns the bit on in all the writes. Cisco MDA 9000 Family Secure Erase Configuration Guide 1-3

14 Features and Capabilities Chapter 1 Product Overview Features and Capabilities Cisco Secure Erase has the following features and capabilities: Configuration Using CLI Secure Erase provides a set of CLI commands. The CLI runs on the supervisor and the requests are directly sent to the Secure Erase process running on the Secure Erase node. Support Function Secure Erase supports multiple storage ports and multiple storage arrays. Data Erase Secure Erase supports data erase using different algorithms. Secure Erase Algorithms Secure Erase provides algorithms recommended by the United States Department of Defense, the Royal Canadian Police, and the NIST algorithm recommended by the National Institute of Standards and Technology, an agency of the US Department of Commerce. There is a provision to create and use your own proprietary algorithms. You can choose from the following algorithms: Gutmann ( RCMP DoD M DoD M-S NIST All zeroes Synchronize Cache Synchronize cache is a SCSI command to request the storage controller to synchronize the data present in the cache to the physical media. This command can specify an LBA range for which the cache needs to be synchronized. Secure Erase executes this command at every step of the algorithm to instruct the storage controller to write each pattern to the physical media before next pattern is written. Please check with the array vendor to find out whether synchronize cache is supported. 1-4 Cisco MDA 9000 Family Secure Erase Configuration Guide

15 Chapter 1 Product Overview Requirements and Prerequisites Requirements and Prerequisites The prerequisites described in the following sections are required to set up Secure Erase. Software Requirements Cisco Secure Erase has the following software requirements: MDS switches hosting the MSM-18/4 module and 9222i switch must be running SAN-OS Release 3.3(1a) or later. The Fabric Manager server version must be SAN-OS Release 3.3(1a) or later. Hardware Requirements Cisco Secure Erase has the following hardware requirements: MSM-18/4 module and 9222i switch The following switches support the MS-18/4 module: All MDS 9200 family switches All MDS 9500 family switches Software Licenses Cisco Secure Erase uses the Storage Services Enabler (SSE) Package for the licensing. The SSE license package is not included with the. Cisco MDA 9000 Family Secure Erase Configuration Guide 1-5

16 Requirements and Prerequisites Chapter 1 Product Overview 1-6 Cisco MDA 9000 Family Secure Erase Configuration Guide

17 CHAPTER 2 Configuring Secure Erase This chapter describes how to configure Cisco MDS Secure Erase, and has the following sections: Configuration Overview, page 2-1 Configuration Process, page 2-1 Secure Erase is included in the SSI image. Configuration Overview Cisco Secure Erase runs on the MSM-18/4 module and 9222i switch installed in an MDS 9500 or 9200 series switch. The Secure Erase software package is included in the SSI image, which is delivered as part of NX-OS. The Secure Erase feature must be provisioned on the MSM-18/4 module. Configuration Process The following sections provide an overview of a typical Secure Erase process: Obtaining Information, page 2-2 Setting Up Cisco Secure Erase, page 2-3 Job Configuration, page 2-4 Recovering Secure Erase Configuration, page

18 Configuration Process Chapter 2 Configuring Secure Erase Figure 2-1 Secure Erase Workflow Diagram Step 1: Obtain Information Collect information about Storage Enclosures Step 2: Setup Creating Virtual Initiators, Zoning and Storage Array Configuration Step 3: Job Configuration Create Secure Erase Jobs and Sessions Obtaining Information You need to collect the following information about the target enclosure: Information about the target enclosure or storage array on which you would like to perform Secure Erase. The storage array is also called as Secure Erase storage array. Information about WWNs of the target ports you would like to use to access the target enclosure. The target ports are called Secure Erase target ports and the VSANs where the Secure Erase target ports reside are called Secure Erase VSANs. Information about one or more LUNs on the Secure Erase storage array on which you would like to perform Secure Erase. These LUNs are also called as Secure Erase LUNs. 2-2

19 Chapter 2 Configuring Secure Erase Configuration Process Setting Up Cisco Secure Erase You need to create the VIs, setup zone, and storage array configuration to preconfigure Secure Erase. The CLI configuration is preserved across reboots or switch reloads. It is preferred to have one job per storage enclosure. A storage enclosure can have multiple storage ports spanning multiple VSANs and storage LUNs. To set up Secure Erase, follow these procedures:. Command Purpose Step 1 switch# config t Enters configuration mode. Step 2 Step 3 Step 4 switch# MSM-18/4 enable feature se module module-id switch# secure-erase module module-id create-vi vsan secure-erase VSAN switch# show secure-erase module module-id vsan secure-erase VSAN Provisions the Secure Erase feature on the specific module. Creates VIs in a Secure Erase VSAN. Note This command must be performed for each Secure Erase VSAN. Once created, VIs are available for all Secure Erase jobs. Also, WWNs of the VIs are persistent across reload of the switch or MSM-18/4. Displays the WWNs of Secure Erase VIs created in the previous step. Complete the additional following tasks: Set up the zone. Decide on one or more Secure Erase VIs and zone target ports that you would like to use to perform Secure Erase. Program the storage array. The Secure Erase storage array must be programmed to enable Secure Erase VIs to access the Secure Erase LUNs. Secure Erase requires write commands to go directly to the physical media. Secure Erase sends all write commands with Force Unit Access (FUA) bit on. When the bit is set, the SCSI device is instructed to bypass the cache and perform the command directly on the physical media. Note Check with the storage array vendor to confirm that FUA bit is supported in SCSI writes. 2-3

20 Configuration Process Chapter 2 Configuring Secure Erase Figure 2-2 Interaction of SUP and MSM-18/4 Secure Erase Command Parser SUPERVISOR Command Response Secure Erase Daemon Secure Erase node All Secure Erase CLIs are performed on the Supervisor. The Secure Erase configuration is stored in persistent memory on the supervisor engine. Job Configuration You can configure Cisco Secure Erase jobs and sessions using the CLI. For information about the CLI, refer to the Secure Erase CLI Command Reference, page A-1. To create a Secure Erase job and session, follow these steps: Step 1 Step 2 Step 3 Command secure-erase module module-id create job job-id secure-erase module module-id job job-id add-vi vsan secure-erase VSAN all pwwn secure-erase VI pwwn add-tgt vsan secure-erase VSAN pwwn secure-erase target port pwwn secure-erase module module-id job job-id add-session vsan secure-erase VSAN pwwn secure-erase target port pwwn all-lun lun secure-erase LUN algorithm algorithm name/id Step 4 show secure-erase module module-id job job-id details Step 5 secure-erase module module-id start job job-id Purpose Creates a Secure Erase job. Adds Secure Erase VIs and Secure Erase target ports to a Secure Erase job. Note You can use the CLI commands several times to include all the Secure Erase VIs and Secure Erase target ports in all the Secure Erase VSANs. Creates Secure Erase sessions for each Secure Erase LUN. This command performs these tasks: Creates a login from the Secure Erase VIs to the Secure Erase target ports. Discovers LUNs exposed through Secure Erase target ports. For example, issue TUR, Report LUNs, Inquiry, and Read Capacity. Note The job must have one or more Secure Erase VIs in the Secure Erase VSAN. Displays information about all jobs. Starts the job. The process of writing the pattern sequence dictated by the erase algorithm is specified. 2-4

21 Chapter 2 Configuring Secure Erase Configuration Process To stop or abort a Secure Erase job and session, follow this step: Step 1 Command secure-erase module module-id stop abort job job-id Purpose Stops or aborts the job. The Stop command waits for completion of the current pattern and pauses the pattern sequence. A stopped job can be restarted. Aborting the job does not wait for completion of a current pattern. An aborted job can not be restarted. Recovering Secure Erase Configuration All of the Secure Erase configuration is stored in persistent memory and is automatically recovered on a crash or reload of the MSM-18/4 module or a reload of the Cisco MDS supervisors. After the recovery process is complete, you can validate the recovered data by performing a discovery process using this command: secure-erase module module-id validate job job-id 2-5

22 Configuration Process Chapter 2 Configuring Secure Erase 2-6

23 CHAPTER 3 Configuring Secure Erase Using Cisco Fabric Manager The Fabric Manager provides a user interface to configure Secure Erase jobs and operations on the switch by using a job creation wizard. This chapter describes how to configure Cisco MDS Secure Erase using Cisco Fabric Manager, and includes the following sections: Provisioning Secure Erase on the MSM-18/4 Module, page 3-1 Using the Secure Erase Pre-Configuration Wizard, page 3-3 Creating a Secure Erase Workflow Using Fabric Manager, page 3-13 Displaying Secure Erase Job Status, page 3-18 Secure Erase is supported on the MSM-18/4 module and the MDS 9222i switch. The MSM-18/4 module and the MDS 9222i switch are referred to as a Secure Erase node. Note This feature will not be supported on switches running releases prior to NX-OS Release 5.0(1a). Provisioning Secure Erase on the MSM-18/4 Module You need to enable the Secure Erase feature on the Secure Erase nodes for them to participate in the Secure Erase operation. To enable Secure Erase on the MSM-18/4, follow these steps: Step 1 Expand End Devices in the Physical Attributes pane and click the MSM/SSN tab in the information pane to obtain the module information. (See Figure 3-1.) 3-1

24 Provisioning Secure Erase on the MSM-18/4 Module Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Figure 3-1 MSM/SSN Tab Step 2 From the feature drop-down list, select SE to provision the MSM-18/4 with Secure Erase. (See Figure 3-2.) Figure 3-2. Feature Drop-Down List Once the MSM-18/4 is provisioned, the entry is displayed in the table. (See Figure 3-3.) 3-2

25 Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Using the Secure Erase Pre-Configuration Wizard Figure 3-3 MSM Module Entry Using the Secure Erase Pre-Configuration Wizard The Secure Erase Pre-configuration wizard performs the following steps so that the Secure Erase capable module is ready to run the Secure Erase jobs: 1. Configures SSH by doing the following: Enables SSH. Creates keys. 2. Configures IP connectivity. Creates the VSAN 1 interface and configures IP. Create the CPP IPFC interface and configures IP. 3. Enables IPv4 routing. 4. Configures the IP default gateway for the MSM-18/4 module or the MDS 9222i switch. 5. Configures a zone to include the pwwn of MSM-18/4 module or the MDS 9222i switch and the supervisor module. 6. Enables the Secure Erase feature. In the Secure Erase Pre-configuration wizard, when you click Next at each step, the configuration listed for that step will be preformed. For most steps, the Back button is disabled in the wizard. However, if an error occurs at any step, you are prevented from moving to the next step until you modify the data and click Next again successfully. Also, if you click Cancel, the wizard exits at the step without undoing any of the settings performed by the previous steps. The Back option will not be available for the steps in this wizard. To use the Secure Erase Pre-configuration wizard, launch the Fabric Manager GUI after selecting the required fabric (See Figure 3-4). Note Before you use the Secure Erase Pre-configuration wizard, install the Secure Erase package with the SSI image in the switch. SSH is enabled by the Secure Erase pre-configuration setup. 3-3

26 Using the Secure Erase Pre-Configuration Wizard Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager To display the Secure Erase Pre-Configuration wizard, from the Fabric Manager menu, choose Tools > Secure Erase > Pre-configuration. You see the Secure Erase Pre-Configuration Wizard screen. (See Figure 3-5.) Figure 3-4 Secure Erase Pre-Configuration 3-4

27 Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Configuring MDS Modules for Secure Erase Configuring MDS Modules for Secure Erase To configure MDS modules for Secure Erase, follow these steps: Step 1 Select the Secure Erase capable modules that you want to configure and click Next. The Modules for Set Up screen (see Figure 3-5) displays only the switch and modules that do not have the Secure Erase feature enabled. The switch must be running Cisco NX-OS Release 5.0 or later. This wizard cannot be used to edit existing configurations. Figure 3-5 Modules for Set Up Step 2 The Enable Secure Shell (SSH) screen (see Figure 3-6) displays a list of Secure Erase switches. The table indicates if SSH is enabled and if the key already exists. a. Click Next. A SSH key is created if the key does not already exist. SSH is enabled. The SSH key is created for protocol RSA with a numbits value of Note If SSH is already enabled on all switches, then the No action necessary message is displayed. Click Next to continue. 3-5

28 Configuring MDS Modules for Secure Erase Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Figure 3-6 Enable Secure Shell (SSH) Step 3 Select a switch from the drop-down list to configure the IP address and mask for the VSAN 1 interface. a. Click Add (See Figure 3-7) The switch moves from the drop-down list to the table. One entry can be added for each switch. b. Click Next. The IP address is created and the IPv4 routing is enabled for all the switches that are selected. Note The valid mask values are 8, 16, 24, or 32. If the VSAN 1 IP address is already configured for the switch, then the switch does not appear in the drop-down list. If all the switches already have the VSAN 1 IP address configured, then a message is displayed. Once you click Next, the IPv4 routing is configured. If you do not add a VSAN 1 IP address for all the switches in the list and click Next, an error message is displayed. (See Figure 3-8.) 3-6

29 Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Configuring MDS Modules for Secure Erase Figure 3-7 Configure VSAN IP Connectivity Figure 3-8 Error Message for VSAN IP Connectivity Step 4 Select a switch module from the drop-down list and specify the CPP IP address/mask. (See Figure 3-9) a. Click Add to move the switch module from the drop-down list to the table. The CPP IP address must be in the same subnet as the VSAN 1 IP address or an error message is displayed. Only one entry can be added for each switch module. b. Click View necessary gateways. The Necessary Default Gateways screen is displayed. (See Figure 3-10). c. Click Next. The IP address is created and the gateway is configured. The Configure Module IP Connectivity screen (see Figure 3-9) sets the IP address for CPP and configures the default gateway for the CPP interface to point to the VSAN 1 IP address. All IP traffic from the CPP interface is routed to the management interface. 3-7

30 Configuring MDS Modules for Secure Erase Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Figure 3-9 Configure Module IP Connectivity The Necessary Default Gateways screen (see Figure 3-10) shows the VSAN 1 IP address that will be used to configure the default gateway for each of the switch modules. It also shows if a default gateway already exists. 3-8

31 Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Configuring MDS Modules for Secure Erase Figure 3-10 Necessary Default Gateways Note The valid mask values are 8, 16, 24, or 32. If the CPP IP address is already configured for the switch module, then the module does not appear in the drop-down list. The 9222i switch is not displayed in the drop-down list because it is not required to set a separate CPP IP address or default gateway for this module. If all of the switch modules already have their CPP IP addresses configured, then a message is displayed. Click Next. The necessary default gateways are configured. Step 5 Click Create/Activate Zones. The wizard goes through the fabrics to create the zones. (See Figure 3-11) Before creating the zones, the wizard checks if the active and local zone databases of the principle switch match. If there is a mismatch, an input dialog box is displayed. You will be prompted to copy the active zone database to the local zone database. If you click Yes, the zones are created on the principal switch for the fabric. If you click No, the zone creation is skipped for the zone mismatched fabric. After the zone creation is complete, a popup dialog box is displayed that specifies if the zone creation process was successful or if it failed. If there is an error during the zone creation, the Create/Activate Zones button is enabled. Click Create/Activate Zones again to create the zones that failed previously. Only the zones that failed previously will be created to avoid any duplicate entries in the zones database. Once all the zones are created successfully on all the fabrics, the Create/Activate Zones button is disabled and the Status button is enabled. (See Figure 3-12.) 3-9

32 Configuring MDS Modules for Secure Erase Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager (Optional) If you wish to do the zoning yourself, follow these steps: a. Click Next without clicking Create/Activate Zones. A warning message is displayed stating that the zones are not created and asking if you wish to continue to the next step without creating zones. b. Click Yes to continue. The Status button allows the user to verify that the zones were added to the active zone database. Note Zoning is not required for the MDS 9222i switch because this module type is also a supervisor and does not need to be zoned with the supervisor s VSAN 1 WWN to allow communication. The Zoning screen (see Figure 3-11) creates a zone to include the VSAN 1 WWN and the module WWN for each of the selected module. Figure 3-11 Zoning 3-10

33 Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Configuring MDS Modules for Secure Erase The Zone Creation Status screen (see Figure 3-12) shows all the zones in the active zone database. Figure 3-12 Zone Creation Status Step 6 Click Finish to complete the Secure Erase Pre-configuration wizard setup (See Figure 3-13). 3-11

34 Configuring MDS Modules for Secure Erase Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Figure 3-13 Secure Erase Feature Note The Secure Erase Pre-configuration wizard enables the Secure Erase functionality for all the nodes on the modules selected. A message appears that shows the status of the setup as a success or as a failure. If successful, the Finish button is disabled and the Cancel button changes to Close. 3-12

35 Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Creating a Secure Erase Workflow Using Fabric Manager Creating a Secure Erase Workflow Using Fabric Manager You can create a Secure Erase job using the Secure Erase wizard in Fabric Manager. To create a workflow using the Secure Erase wizard, from the Fabric Manager menu, choose Tools > Secure Erase > Secure Erase. The job creation screen is displayed. (See Figure 3-14.) Figure 3-14 Secure Erase Configuration Note Fabric Manager will internally add the string SE as a prefix to all job names so that they are identified as SE jobs and not as DMM jobs. The Secure Erase job creation panel is displayed with all the enclosures listed. 3-13

36 Creating a Secure Erase Job Using Fabric Manager Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Creating a Secure Erase Job Using Fabric Manager To configure Secure Erase jobs, follow these steps: Step 1 Select an enclosure from the enclosure list. The port list is populated with the end ports belonging to the selected enclosure. (See Figure 3-15) a. Select multiple target ports from the list. b. Click Next. The wizard will validate that the target ports selected belong to same fabric and the same VSAN (the target ports cannot span across VSANs). Note The selected multiple target ports should belong to the same fabric and the same VSAN. Figure 3-15 Secure Erase Create Job Step 2 Select the SE-enabled module in the fabric. (See Figure 3-16.) a. Click Next. All DPP Virtual Initiators (VIs) for the selected module are listed. 3-14

37 Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Creating a Secure Erase Job Using Fabric Manager Note All of the SE-enabled modules in the VSAN that the target ports belong to are listed. The module with the least number of active jobs should be selected by default. Ensure that the number of active jobs for each module is listed correctly. Figure 3-16 Secure Erase Enable Module Step 3 Select a DPP Virtual Initiator (VI) for Secure Erase. The first DPP VI in the list is selected by default. Verify that the pwwn, nwwn, and the job number are listed correctly for each DPP VI. (See Figure 3-17.) a. Click Create/Activate Zone. The Zone Activation Status is displayed. (See Figure 3-18.) Zones are created for each of the VSANs that the selected targets belong to and the selected DPP VI. b. Click Status to view the Zone creation or activation status. c. Click Next. All of the selected targets with the LUNs are listed. 3-15

38 Creating a Secure Erase Job Using Fabric Manager Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Figure 3-17 DPP VI Selection 3-16

39 Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Creating a Secure Erase Job Using Fabric Manager Figure 3-18 Zone Activation Status Step 4 Select the LUNs for which the sessions need to be created. (See Figure 3-19.) Note Checking the Session check box at target level will check all the LUNs for that target. Unchecking the session check box for any of the LUNs will automatically uncheck the check box at the parent target level. a. Select the algorithm for each LUN. (See Figure 3-19.) Note Selecting an algorithm at target level will select that algorithm for all the LUNs for that target. Selecting a different algorithm for any of the LUNs will automatically mark the algorithm as Mixed at the parent target level. 3-17

40 Creating a Secure Erase Job Using Fabric Manager Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Figure 3-19 Create Session Step 5 Click Finish. The Secure Erase job is created with specxified sessions. If multiple LUNs were selected and at least one session is created successfully, then the operation is considered to be successful. Displaying Secure Erase Job Status To verify the Secure Erase jobs and session information, follow these steps: Step 1 Expand End Devices in the Physical Attributes pane and select Secure Erase. The information pane is displayed. (See Figure 3-20.) 3-18

41 Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager Creating a Secure Erase Job Using Fabric Manager Figure 3-20 Secure Erase Job Status View Step 2 Select a job status for each Secure Erase job. The following opearations are allowed on each job: Start Starts the Secure Erase job. The session progress can be viewed in the session rows. Stop Stops the Secure Erase job. The session progress can be viewed in the session rows. Abort Aborts the Secure Erase job. The session progress can be viewed in the session rows. Validate Validates the Secure Erase job. The session progress can be viewed in the session rows. Delete Deletes the selected Secure Erase job. 3-19

42 Creating a Secure Erase Job Using Fabric Manager Chapter 3 Configuring Secure Erase Using Cisco Fabric Manager 3-20

43 APPENDIXA Secure Erase CLI Command Reference The Cisco MDS Secure Erase provides CLI commands that support scripting and advanced operations. This appendix contains a list of alphabetically arranged commands that are unique to Cisco MDS Secure Erase. For information about other commands that apply to the Cisco MDS 9000 Family of multilayer directors and fabric switches, refer to the Cisco MDS 9000 Family CLI Configuration Guide. A-1

44 add-session vsan Appendix A Secure Erase CLI Command Reference add-session vsan To add sessions to a job, use the add-session vsan command in configuration mode. add-session vsan vsan-id pwwn tgt-pwwn all-luns lun lun-id algorithm name/id Syntax Description vsan-id pwwn tgt-pwwn all-luns lun lun-id algorithm name/id Specifies the VSAN ID of the target. Specifies the pwwn of the target. Specifies all of the LUNs in the Secure Erase session. Specifies the LUN ID of the Secure Erase session. Specifies the algorithm that should be used for the session. Defaults None. Command Modes Configuration Secure Erase job submode Command History Release 3.3(1a) Modification This command was introduced. Usage Guidelines None. Examples The following example shows how to add a VI to a specific Secure Erase job: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 job 1 switch(config-se-job)# add-session vsan 1 pwwn 20:04:00:a0:b8:16:92:18 all-luns algorithm RCMP Related Commands Command add-session job Description Adds sessions to the job. A-2

45 Appendix A Secure Erase CLI Command Reference add-step dynamic add-step dynamic To add a dynamic pattern step to a specific algorithm, use the add-step dynamic command in configuration mode. add-step dynamic [0 1] Syntax Description 0 (Optional) Specifies that the pattern is generated using a random number generator. 1 (Optional) Specifies that the pattern is complimentary to the previous pattern. Defaults None. Command Modes Configuration Secure Erase algorithm submode Command History Release 3.3(1a) Modification This command was introduced. Usage Guidelines None. Examples The following example shows how to add a dynamic pattern step to a specific algorithm: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 algorithm 0 switch(config-se-algo)# switch(config-se-algo)# add-step dynamic 0 Related Commands Command add-step static Description Adds static pattern step to a specific algorithm. A-3

46 add-step static Appendix A Secure Erase CLI Command Reference add-step static To add a static pattern step to a specific algorithm, use the add-step static command in configuration mode. add-step static pattern Syntax Description pattern Specifies the static pattern step. The pattern is to write ranges from 1 to 512 bytes and can consist of only characters 0 to 9 and A to F. Defaults None. Command Modes Configuration Secure Erase algorithm submode Command History Release 3.3(1a) Modification This command was introduced. Usage Guidelines None. Examples The following example shows how to add a static step to a specific algorithm: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 algorithm 0 switch(config-se-algo)# switch(config-se-algo)# add-step static 1 Related Commands Command add-step dynamic Description Adds a dynamic pattern step to a specific algorithm. A-4

47 Appendix A Secure Erase CLI Command Reference add-tgt vsan add-tgt vsan To define target enclosure and add multiple target ports for a specific Secure Erase job, use the add-tgt vsan command in configuration mode. add-tgt vsan vsan-id pwwn target port pwwn Syntax Description vsan-id pwwn target port pwwn Specifies the VSAN ID of the target port added to a Secure Erase job. Specifies the port world-wide name (pwwn) of the target port. Defaults None. Command Modes Configuration Secure Erase job submode Command History Release 3.3(1a) Modification This command was introduced. Usage Guidelines The target ports added to a specific job can be part of a different VSAN. The Secure Erase application creates VIs in a specific VSAN. Note VIs and targets from different VSANs can be added to a job. A storage array may have multiple storage ports belonging to a different VSAN. You can create one job for one storage array. Examples The following example shows how to define a target enclosure and add multiple target ports for a specific Secure Erase job: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 job 1 switch(config-se-job)# add-tgt vsan 1 pwwn 20:04:00:a0:b8:16:92:18 Related Commands Command Description add-session vsans Adds sessions to a job. add-vi job Adds a VI to a specific Secure Erase job. secure-erase create job Creates a Secure Erase job. A-5

48 add-vi vsan Appendix A Secure Erase CLI Command Reference add-vi vsan To add a VI to a specific Secure Erase job, use the add-vi vsan command in configuration mode. add-vi vsan vsan-id all pwwn VI pwwn Syntax Description vsan-id all pwwn VI pwwn Specifies the VSAN ID of the target where a VI exists. Adds all the VSAN IDs of the target. Adds a specific VI in a given VSAN to the job. Defaults None. Command Modes Configuration Secure Erase job submode Command History Release 3.3(1a) Modification This command was introduced. Usage Guidelines You must add at least one VI in each VSAN where a Secure Erase target is present. All VIs that are part of the same job and the VSAN must have same target view. The same set of targets and LUNs must be exposed for all VIs in the same VSAN. Note VI-CPP can not be added to a job. To know the WWN of the VI-CPP, run the show isapi virtual-nport database command on MSM-18/4 module. Examples The following example shows how to add all VIs to a given Secure Erase job: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 job 1 switch(config-se-job)# add-vi vsan 1 all The following example shows how to add a VI to a given Secure Erase job: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 job 1 switch(config-se-job)# add-vi vsan 1 pwwn 2c:0d:00:05:30:00:43:64 Related Commands Command add-session job Description Adds sessions to the job. A-6

49 Appendix A Secure Erase CLI Command Reference add-vi vsan Command Description add-vi job Adds a VI to a specific Secure Erase job. secure-erase create job Creates a Secure Erase job. A-7

50 empty Appendix A Secure Erase CLI Command Reference empty To remove all steps of the user-configured algorithm, use the empty command in configuration mode. empty Syntax Description This command has no arguements or keywords. Defaults None. Command Modes Configuration Secure Erase algorithm submode Command History Release 3.3(1a) Modification This command was introduced. Usage Guidelines None. Examples The following example shows how to remove all steps of the user-configured algorithm: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 algorithm 0 switch(config-se-algo)# switch(config-se-algo)# empty Related Commands Command add-step dynamic add-step static Description Adds a dynamic pattern step to a specific algorithm. Adds static pattern step to a specific algorithm. A-8

51 Appendix A Secure Erase CLI Command Reference secure-erase abort job secure-erase abort job To abort a Secure Erase job, use the secure-erase abort job command in configuration mode. secure-erase module-id abort job job-id Syntax Description module-id job-id Specifies the desired module number of the MSM-18/4 on which Secure Erase is provisioned. Specifies the job ID of the target. Defaults None. Command Modes Configuration mode Command History Release 3.3(1a) Modification This command was introduced. Usage Guidelines This command does not wait for the completion of current patterns. An aborted job cannot be restarted. A job can be aborted only when it has one or more sessions in the running state. Examples The following example shows how to abort a Secure Erase job: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 abort job 1 Related Commands Command secure-erase start job secure-erase stop job secure-erase validate job Description Restarts all sessions in a job. Stops all sessions in a job. Validates a job in a session. A-9

52 secure-erase create algorithm Appendix A Secure Erase CLI Command Reference secure-erase create algorithm To configure a Secure Erase algorithm on a specific slot of the intelligent line card where Secure Erase is provisioned, use the secure-erase module create algorithm command in configuration mode. secure-erase module module-id create algorithm algorithm-id Syntax Description module-id Specifies the desired slot number of the intelligent line card on which Secure Erase is provisioned. algorithm-id Specifies the algorithm ID. The range is 0 to 9. Defaults None. Command Modes Configuration mode Command History Release 3.3(1a) Modification This command was introduced. Usage Guidelines None. Examples The following example shows how to create a Secure Erase algorithm: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 create algorithm 3 Related Commands Command secure-erase create-vi vsan Description Creates a VI for a specific VSAN. A-10

53 Appendix A Secure Erase CLI Command Reference secure-erase create job secure-erase create job To create a Secure Erase job, use the secure-erase create job command in configuration mode. secure-erase module module-id create job job-id Syntax Description module module-id job-id Specifies the desired module number of the MSM-18/4 on which Secure Erase is provisioned. Specifies a unique number to identify a Secure Erase job. The range is 1 to Note You will be prompted to choose a different ID if the job ID chosen already exists. Defaults None. Command Modes Configuration mode Command History Release 3.3(1a) Modification This command was introduced. Usage Guidelines A Secure Erase job contains the following information: The target enclosure where Secure Erase needs to be performed. Multiple target ports spanning multiple VSANs can be a part of one target enclosure. Multiple target ports, VIs, and Secure Erase sessions can be added. These target ports and VIs can be a part of different VSANs. Examples The following example shows how to create a Secure Erase job: switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# secure-erase module 2 create job 1 Related Commands Command add-tgt job Description Defines a target enclosure and adds multiple target ports for a specific Secure Erase job. A-11

Cisco MDS 9000 Family Secure Erase Configuration Guide

Cisco MDS 9000 Family Secure Erase Configuration Guide Cisco MDS 9000 Family Secure Erase Configuration Guide For Cisco MDS 9500 and 9200 Series. Cisco MDS 9000 SAN-OS Release 3.4(1) June 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

User Guide for Microsoft Outlook Plug-in for Cisco Unified Videoconferencing Manager Release 7.1

User Guide for Microsoft Outlook Plug-in for Cisco Unified Videoconferencing Manager Release 7.1 User Guide for Microsoft Outlook Plug-in for Cisco Unified Videoconferencing Manager Release 7.1 March 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Installing the RJ-45 Bracket and Cable on the Cisco ONS Rack

Installing the RJ-45 Bracket and Cable on the Cisco ONS Rack Installing the RJ-45 Bracket and Cable on the Cisco ONS 15454 Rack This document describes how to install the optional RJ-45 bracket and cable on the Cisco ONS 15454 equipment rack. This kit, included

More information

Cisco Unified Web and Interaction Manager Browser Settings Guide

Cisco Unified Web and  Interaction Manager Browser Settings Guide Cisco Unified Web and E-Mail Interaction Manager Browser Settings Guide For Unified Contact Center Enterprise and Hosted and Unified ICM Release 4.3(1) September 2009 Americas Headquarters Cisco Systems,

More information

Recovery Guide for Cisco Digital Media Suite 5.2 Appliances

Recovery Guide for Cisco Digital Media Suite 5.2 Appliances Recovery Guide for Cisco Digital Media Suite 5.2 Appliances May 3, 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

1 Obtaining Cisco ANA NSA 1.0 Patch 1

1 Obtaining Cisco ANA NSA 1.0 Patch 1 Readme File for the Cisco ANA NSA 1.0 Patch 1 This readme file supports the release of Cisco Active Network Abstraction Network Service Activation (Cisco ANA NSA) 1.0, Patch 1. The patch is installed on

More information

Cisco TEO Adapter Guide for BMC Remedy

Cisco TEO Adapter Guide for BMC Remedy Release 2.2 September 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text

More information

Cisco Redundant Power System 2300 Compatibility Matrix

Cisco Redundant Power System 2300 Compatibility Matrix Cisco Redundant Power System 2300 Compatibility Matrix November 2008 This document contains the list of Cisco products that are compatible with the Cisco Redundant Power System 2300 (RPS 2300). Table 1

More information

Cisco WAAS Mobile User Guide

Cisco WAAS Mobile User Guide Cisco WAAS Mobile User Guide Software Version 3.5 April 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

User Guide for Cisco IP Phone Messenger Release 8.0, 8.5, and 8.6

User Guide for Cisco IP Phone Messenger Release 8.0, 8.5, and 8.6 User Guide for Cisco IP Phone Messenger Release 8.0, 8.5, and 8.6 May 15, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Cisco MDS 9000 Family NX-OS High Availability and Redundancy Configuration Guide

Cisco MDS 9000 Family NX-OS High Availability and Redundancy Configuration Guide Cisco MDS 9000 Family NX-OS High Availability and Redundancy Configuration Guide July 2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco Video Surveillance Virtual Matrix Client Configuration Guide

Cisco Video Surveillance Virtual Matrix Client Configuration Guide Cisco Video Surveillance Virtual Matrix Client Configuration Guide Release 6.2 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Cisco MDS 9000 Family Data Mobility Manager Configuration Guide

Cisco MDS 9000 Family Data Mobility Manager Configuration Guide Cisco MDS 9000 Family Data Mobility Manager Configuration Guide Cisco MDS NX-OS Release 5.0(1a) Software February, 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Release Notes for TimeCardView 7.0.x

Release Notes for TimeCardView 7.0.x First published: January 26, 2009, Revised: August 7, 2009 Contents Introduction, page 1 System Requirements, page 2 Files Included in TimeCardView 7.0.x, page 4 Caveats, page 5 Additional References,

More information

Cisco Nexus 7000 Series NX-OS Virtual Device Context Command Reference

Cisco Nexus 7000 Series NX-OS Virtual Device Context Command Reference Cisco Nexus 7000 Series NX-OS Virtual Device Context Command Reference July 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Cisco Unified Web and Interaction Manager Browser Settings Guide

Cisco Unified Web and  Interaction Manager Browser Settings Guide Cisco Unified Web and E-Mail Interaction Manager Browser Settings Guide For Unified Contact Center Enterprise and Hosted and Unified ICM Release 4.2(5) October 2008 Americas Headquarters Cisco Systems,

More information

Installing and Configuring the Microsoft Outlook Client Plug-in for Cisco Unified Videoconferencing Manager Release 7.1

Installing and Configuring the Microsoft Outlook Client Plug-in for Cisco Unified Videoconferencing Manager Release 7.1 INTEGRATION NOTE Installing and Configuring the Microsoft Outlook Client Plug-in for Cisco Unified Videoconferencing Manager Release 7.1 Revised: March 31, 2010, OL-22091-01 1 Overview 2 Prerequisites

More information

RAID Battery Backup Unit Replacement and RAID Firmware Upgrade for Cisco Security MARS

RAID Battery Backup Unit Replacement and RAID Firmware Upgrade for Cisco Security MARS RAID Battery Backup Unit Replacement and RAID Firmware Upgrade for Cisco Security MARS Published: August 20, 2009 This document ships with the Cisco Security MARS RAID Controller Back-Up Battery Unit (BBU),

More information

Release Notes for Click to Call Release 7.x

Release Notes for Click to Call Release 7.x Revised: November 27, 2009 These release notes describe all versions of Click to Call Release 7.x. To access the latest software upgrades for all versions of Click to Call, go to http://www.cisco.com/kobayashi/sw-center/sw-voice.shtml

More information

Upgrading to the Cisco ASR 1000 Series Routers ROMmon Image Release 12.2(33r)XNC

Upgrading to the Cisco ASR 1000 Series Routers ROMmon Image Release 12.2(33r)XNC Upgrading to the Cisco ASR 1000 Series Routers ROMmon Image Release 12.2(33r)XNC Published: October 23, 2009 This document contains procedures for downloading independent ROM monitor (ROMmon) software

More information

Security Best Practices Supplement for Cisco Digital Media Encoders

Security Best Practices Supplement for Cisco Digital Media Encoders Security Best Practices Supplement for Cisco Digital Media Encoders Published: November 10, 2009 Revised: November 10, 2009 This supplement describes our recommendations about how to establish and maintain

More information

Configuring LDAP. Finding Feature Information. Contents

Configuring LDAP. Finding Feature Information. Contents Configuring LDAP First Published: March 19, 2010 Last Updated: March 19, 2010 Lightweight Directory Access Protocol (LDAP) is integrated into Cisco IOS software as a AAA protocol alongside the existing

More information

Cisco TEO Adapter Guide for Web Service

Cisco TEO Adapter Guide for Web Service Release 2.2 September 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text

More information

Release Notes for Cisco ONS MA Release 9.01

Release Notes for Cisco ONS MA Release 9.01 Release Notes for Cisco ONS 15310-MA Release 9.01 Revised: July 2009, Release notes contain the new features and enhancements for the Cisco ONS 15310-MA platform. For detailed information regarding features,

More information

Hardware and System Software Specification (Bill of Materials)

Hardware and System Software Specification (Bill of Materials) (Bill of Materials) Cisco Unified Intelligence Suite Release 7.5(x) Revision 1.8 Updated for Maintenance Release 7.5(4) on August 10, 2010 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Software Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)

Software Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) Software Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) First Published: 2017-07-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA

More information

Cisco Nexus 4001I and 4005I Switch Module for IBM BladeCenter Getting Started Guide

Cisco Nexus 4001I and 4005I Switch Module for IBM BladeCenter Getting Started Guide Send feedback to nexus4k-docfeedback@cisco.com Cisco Nexus 4001I and 4005I Switch Module for IBM BladeCenter Getting Started Guide This document includes the following sections: Overview, page 1 Safety

More information

Release Notes for Cisco ONS SDH Release 9.01

Release Notes for Cisco ONS SDH Release 9.01 Release Notes for Cisco ONS 15454 SDH Release 9.01 Revised: July 2009, Release notes contain the new features and enhancements for the Cisco ONS 15454 SDH platform. For detailed information regarding features,

More information

Maintenance Checklists for Microsoft Exchange on a Cisco Unity System

Maintenance Checklists for Microsoft Exchange on a Cisco Unity System Maintenance Checklists for Microsoft Exchange on a Cisco Unity System Published January 13, 2009 This document contains checklists for tasks required to ensure that the Cisco Unity system and Microsoft

More information

The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer

The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer deployments. For more information, visit: http://www.cisco.com/go/designzone.

More information

Installing and Configuring the Lotus Notes Plug-in for Cisco Unified Videoconferencing Manager Release 7.1

Installing and Configuring the Lotus Notes Plug-in for Cisco Unified Videoconferencing Manager Release 7.1 INTEGRATION NOTE Installing and Configuring the Lotus Notes Plug-in for Cisco Unified Videoconferencing Manager Release 7.1 Revised: March 19, 2010, OL-22093-01 1 Overview 2 Lotus Domino User Interface

More information

Maintenance Checklists for Active Directory on a Cisco Unity System with Exchange as the Message Store

Maintenance Checklists for Active Directory on a Cisco Unity System with Exchange as the Message Store Maintenance Checklists for Active Directory on a Cisco Unity System with Exchange as the Message Store Published January 13, 2009 This document contains checklists for tasks required to ensure that the

More information

Connecting Cisco 4-Port FXS/DID Voice Interface Cards

Connecting Cisco 4-Port FXS/DID Voice Interface Cards Connecting Cisco 4-Port FXS/DID Voice Interface Cards Revised: April 15, 2008, OL-15695-01 Overview This document provides an overview of Cisco interface cards and explains how to install the Cisco 4-port

More information

Cisco MDS 9000 Family Hardware and Software Compatibility Matrix and Feature Lists

Cisco MDS 9000 Family Hardware and Software Compatibility Matrix and Feature Lists Cisco MDS 9000 Family Hardware and Software Compatibility Matri and Feature Lists Cisco MDS NX-OS Release 5.0(1a) Software April 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Cisco Unified Web and Interaction Manager Supervision Console User s Guide

Cisco Unified Web and  Interaction Manager Supervision Console User s Guide Cisco Unified Web and E-Mail Interaction Manager Supervision Console User s Guide For Unified Contact Center Enterprise and Hosted and Unified ICM Release 4.2(5) October 2008 Americas Headquarters Cisco

More information

Adding a Cisco Small Business 300 Series Switch to SBCS 2.0

Adding a Cisco Small Business 300 Series Switch to SBCS 2.0 SMART Designs Smart Business Communications Systems v2.0 Adding a Cisco Small Business 300 Series Switch to SBCS 2.0 Application Note September, 2010 Americas Headquarters Cisco Systems, Inc. 170 West

More information

Cisco Registered Envelope Recipient Guide

Cisco Registered Envelope Recipient Guide September 8, 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number:

More information

Release Notes for Catalyst 6500 Series and Cisco 7600 Series Internet Router CEF720 Module ROMMON Software

Release Notes for Catalyst 6500 Series and Cisco 7600 Series Internet Router CEF720 Module ROMMON Software Release Notes for Catalyst 6500 Series and Cisco 7600 Series Internet Router CEF720 Module ROMMON Software Current Release: 12.2(18r)S1 May 28, 2004 This publication describes how to upgrade the ROMMON

More information

Release Notes for Cisco Unified CRM Connector for SAP Release 1.0(1)

Release Notes for Cisco Unified CRM Connector for SAP Release 1.0(1) Release Notes for Cisco Unified CRM Connector for SAP Release 1.0(1) Revised: January 28, 2010 These release notes describe the Release 1.0(1) of Cisco Unified CRM Connector for SAP. To view the release

More information

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement First Published: December 4, 2006 Last Updated: October 2, 2009 The PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement feature

More information

Cisco Fabric Manager Server Federation Deployment Guide

Cisco Fabric Manager Server Federation Deployment Guide Cisco Fabric Manager Server Federation Deployment Guide Cisco MDS NX-OS Release 5.0(1a) Cisco MDS 9000 FabricWare Release 5.x February 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Cisco TEO Adapter Guide for

Cisco TEO Adapter Guide for Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part

More information

Cisco TEO Adapter Guide for Microsoft Windows

Cisco TEO Adapter Guide for Microsoft Windows Cisco TEO Adapter Guide for Microsoft Windows Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Cisco SAN Health Check Service

Cisco SAN Health Check Service Assess the security, resiliency, operation, and readiness of your SAN infrastructure with Cisco SAN Health Check Service. Cisco SAN Health Check Service Determine How to Improve Utilization, Availability,

More information

Using Microsoft Outlook to Schedule and Join Cisco Unified MeetingPlace Express Meetings

Using Microsoft Outlook to Schedule and Join Cisco Unified MeetingPlace Express Meetings Using Microsoft Outlook to Schedule and Join Cisco Unified MeetingPlace Express Meetings Cisco Unified MeetingPlace Express Release 2.x contains a plug-in that allows you to schedule, attend, and manage

More information

Cisco TEO Adapter Guide for SAP Java

Cisco TEO Adapter Guide for SAP Java Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part

More information

Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.0(4)SV1(1)

Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.0(4)SV1(1) Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.0(4)SV1(1) November 25, 2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco TEO Process Automation Guide for Automation for SAP BOBJ Enterprise

Cisco TEO Process Automation Guide for Automation for SAP BOBJ Enterprise Cisco TEO Process Automation Guide for Automation for SAP BOBJ Enterprise Release 2.2 September 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco Unified ICM ACD Supplement for VRU Peripheral Gateway

Cisco Unified ICM ACD Supplement for VRU Peripheral Gateway Cisco Unified ICM ACD Supplement for VRU Peripheral Gateway February 2010 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Cisco Payment Card Industry Compliance Services

Cisco Payment Card Industry Compliance Services PCI Data Security Standard: Protecting Consumers, Protecting You The PCI Data Security Standard affects all types of businesses that process credit card transactions, including: Restaurants, retail establishments,

More information

Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007

Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007 Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007 Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

HP NNM Integration User Guide for CiscoWorks Network Compliance Manager

HP NNM Integration User Guide for CiscoWorks Network Compliance Manager HP NNM Integration User Guide for CiscoWorks Network Compliance Manager Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

RAID Controller Firmware Upgrade Instructions for the Cisco WAE-7341, 7371, and 674

RAID Controller Firmware Upgrade Instructions for the Cisco WAE-7341, 7371, and 674 RAID Controller Firmware Upgrade Instructions for the Cisco WAE-7341, 7371, and 674 Revised: September 15, 2008, This document describes how to upgrade the RAID controller firmware in a Cisco Wide Area

More information

Protected URL Database

Protected URL Database Revised: October, 2008, Contents Managing URL Blacklists Using the SCE 1 Configuring User Authorization 2 How to specify a new owner of the sce-url-database 2 How to configure the sce-url-database write-protection

More information

Exclusive Configuration Change Access and Access Session Locking

Exclusive Configuration Change Access and Access Session Locking Exclusive Configuration Change Access and Access Session Locking First Published: February 28, 2005 Last Updated: May 4, 2009 Exclusive Configuration Change Access (also called the Configuration Lock feature)

More information

Cisco Report Server Readme

Cisco Report Server Readme Cisco Report Server Readme For Cisco Network Planning Solution 2.1, Cisco Network Planning Solution Service Provider 2.1, and Cisco Application Analysis Solution 2.1 Release 2.1 Americas Headquarters Cisco

More information

User Guide for Cisco Unified Service Statistics Manager

User Guide for Cisco Unified Service Statistics Manager User Guide for Cisco Unified Service Statistics Manager Cisco Unified Communications Management Suite Software Release 1.3 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Release Notes for Cisco MDS 9000 Family Fabric Manager Release 4.1(3b)

Release Notes for Cisco MDS 9000 Family Fabric Manager Release 4.1(3b) Release Notes for Cisco MDS 9000 Family Fabric Manager Release 4.1(3b) Release Date: June 1, 2009 Part Number: This document describes the new features, limitations, and caveats for Cisco MDS 9000 Family

More information

Cisco Unified Web and Interaction Manager Supervision Console User s Guide

Cisco Unified Web and  Interaction Manager Supervision Console User s Guide Cisco Unified Web and E-Mail Interaction Manager Supervision Console User s Guide For Unified Contact Center Express Release 4.2(1) July 2007 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Configuring an Intermediate IP Multicast Helper Between Broadcast-Only Networks

Configuring an Intermediate IP Multicast Helper Between Broadcast-Only Networks Configuring an Intermediate IP Multicast Helper Between Broadcast-Only Networks First Published: February 11, 2008 Last Updated: February 11, 2008 When a multicast-capable internetwork is between two subnets

More information

Contextual Configuration Diff Utility

Contextual Configuration Diff Utility Contextual Configuration Diff Utility First Published: November 2003 Last Updated: May 2, 2008 The Contextual Configuration Diff Utility feature provides the ability to perform a line-by-line comparison

More information

Installation and Configuration Guide for Visual Voic Release 8.5

Installation and Configuration Guide for Visual Voic Release 8.5 Installation and Configuration Guide for Visual Voicemail Release 8.5 Revised October 08, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Release Notes for Cisco Unified Attendant Console Standard Release

Release Notes for Cisco Unified Attendant Console Standard Release Release Notes for Cisco Unified Attendant Console Standard Release 10.0.1.1208 First Published: January 9, 2014, 2011, These release notes describe the new features and caveats for Cisco Unified Attendant

More information

Cisco Aironet Very Short 5-GHz Omnidirectional Antenna (AIR-ANT5135SDW-R)

Cisco Aironet Very Short 5-GHz Omnidirectional Antenna (AIR-ANT5135SDW-R) Cisco Aironet Very Short 5-GHz Omnidirectional Antenna (AIR-ANT5135SDW-R) This document outlines the specifications for the Cisco Aironet Very Short 5-GHz Omnidirectional Antenna (AIR-ANT5135SDW-R) and

More information

Cisco Interaction Manager Supervision Console User s Guide

Cisco Interaction Manager Supervision Console User s Guide Cisco Interaction Manager Supervision Console User s Guide Release 4.1(1) January 2007 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco IP Phone Agent User Guide

Cisco IP Phone Agent User Guide Cisco IP Phone Agent User Guide Cisco Desktop Product Suite 4.5 (ICD) Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Cisco Software Licensing Information for Cisco Unified Communications 500 Series for Small Business

Cisco Software Licensing Information for Cisco Unified Communications 500 Series for Small Business Cisco Software Licensing Information for Cisco Unified Communications 500 Series for Small Business Feb. 06, 2008, This document describes the Cisco Software Licensing (CSL) information for the Cisco Unified

More information

Release Notes for Cisco Service Control Management Suite Collection Manager (SCMS CM) 3.1.6

Release Notes for Cisco Service Control Management Suite Collection Manager (SCMS CM) 3.1.6 Release s for Cisco Service Control Management Suite Collection Manager (SCMS CM) 3.1.6 Covers: SCMS CM 3.1.6, SCMS CM 3.1.5, SCMS CM 3.1.0 February 14, 2009 Introduction, page 1 Release SCMS CM 3.1.6,

More information

Cisco Group Encrypted Transport VPN (GET VPN) and LISP Interaction

Cisco Group Encrypted Transport VPN (GET VPN) and LISP Interaction Cisco Group Encrypted Transport VPN (GET VPN) and LISP Interaction SDU DCI Validation and Configuration Notes June 19, 2012 CCDE, CCENT, CCSI, Cisco Eos, Cisco Explorer, Cisco HealthPresence, Cisco IronPort,

More information

Cisco IP Phone Agent User Guide

Cisco IP Phone Agent User Guide CAD 7.6 for Cisco Unified Contact Center Enterprise Release 7.5 May 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Cisco MDS NX-OS Release Compatibility Matrix for Storage Service Interface Images

Cisco MDS NX-OS Release Compatibility Matrix for Storage Service Interface Images Cisco MDS NX-OS Release Compatibility Matrix for Storage Service Interface Images Date: January 6, 2012 Part Number: OL-9150-46 This document provides compatibility information between Cisco MDS NX-OS

More information

Host Upgrade Utility User Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute Engine

Host Upgrade Utility User Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute Engine Host Upgrade Utility User Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute First Published: August 09, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Videoscape Distribution Suite Software Installation Guide

Videoscape Distribution Suite Software Installation Guide First Published: August 06, 2012 Last Modified: September 03, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Connecting Cisco DSU/CSU High-Speed WAN Interface Cards

Connecting Cisco DSU/CSU High-Speed WAN Interface Cards Connecting Cisco DSU/CSU High-Speed WAN Interface Cards Revised: April 15, 2008, Overview This document describes Cisco serial and DSU/CSU high-speed WAN interface cards (HWICs) and how to connect them

More information

Cisco MDS 9000 Family I/O Accelerator Configuration Guide

Cisco MDS 9000 Family I/O Accelerator Configuration Guide Cisco MDS 9000 Family I/O Accelerator Configuration Guide Cisco MDS NX-OS Release 4.2(1) Through 4.2(7) July 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Cisco Unified Web and Interaction Manager Sizing Guide

Cisco Unified Web and  Interaction Manager Sizing Guide Cisco Unified Web and E-mail Interaction Manager Sizing Guide Release 4.1(1) January 2007 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco PGW 2200 Softswitch Generic Call Tagging Feature Module

Cisco PGW 2200 Softswitch Generic Call Tagging Feature Module Cisco PGW 2200 Softswitch Feature Module Document Release History Publication Date August 28, 2009 Comments Initial release of document. Feature History Release Modification 9.8(1) S5P5 The feature was

More information

Cisco Service Control Service Security: Outgoing Spam Mitigation

Cisco Service Control Service Security: Outgoing Spam Mitigation CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Service Security: Outgoing Spam Mitigation Solution Guide, Release 3.5.5 1 Introduction and Scope 2 Functionality Overview 3 Mass-Mailing Based

More information

User Guide for Cisco Unified Videoconferencing 5200 Series MCU Release 7.1

User Guide for Cisco Unified Videoconferencing 5200 Series MCU Release 7.1 User Guide for Cisco Unified Videoconferencing 5200 Series MCU Release 7.1 January 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco Unified Attendant Console Backup and Restore Guide

Cisco Unified Attendant Console Backup and Restore Guide Cisco Unified Attendant Console Backup and Restore Guide Revised: May 30, 2013, 2011, This document describes how to back up Cisco Unified Attendant Console server Version 9.1 (all Editions), and restore

More information

Cisco MDS 9000 Family Release Notes for Storage Services Interface Image Release 4.1(3a)

Cisco MDS 9000 Family Release Notes for Storage Services Interface Image Release 4.1(3a) Cisco MDS 9000 Family Release Notes for Storage Services Interface Image Release 4.1(3a) Release Date: March 11, 2009 Text Part Number: B0 This document describes the caveats and limitations for the Storage

More information

Catalyst 2955 Switch DIN Rail Clip Installation Notes

Catalyst 2955 Switch DIN Rail Clip Installation Notes Catalyst 955 Switch DIN Rail Clip Installation Notes These installation notes provide updated installation and removal instructions for the DIN rail clip on the Catalyst 955 switch. Note For installation,

More information

Cisco MDS SAN-OS Release Compatibility Matrix for Storage Service Interface Images

Cisco MDS SAN-OS Release Compatibility Matrix for Storage Service Interface Images Cisco MDS SAN-OS Release Compatibility Matrix for Storage Service Interface Images Date: May 9, 2011 Text Part Number: OL-9150-28 This document provides compatibility information between Cisco MDS SAN-OS

More information

Cisco Nexus 9000 Series NX-OS Virtual Machine Tracker Configuration Guide, Release 9.x

Cisco Nexus 9000 Series NX-OS Virtual Machine Tracker Configuration Guide, Release 9.x Cisco Nexus 9000 Series NX-OS Virtual Machine Tracker Configuration Guide, Release 9.x First Published: 2018-07-05 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Cisco HealthPresence Patient Pod Assembly Guide

Cisco HealthPresence Patient Pod Assembly Guide Cisco HealthPresence Patient Pod Assembly Guide February 10, 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Connecting Cisco WLAN Controller Enhanced Network Modules to the Network

Connecting Cisco WLAN Controller Enhanced Network Modules to the Network Connecting Cisco WLAN Controller Enhanced Network Modules to the Network Revised: May 1, 2008, OL-16632-01 This guide describes how to connect Cisco wireless LAN (WLAN) controller enhanced network modules

More information

Cisco UCS Director API Integration and Customization Guide, Release 5.4

Cisco UCS Director API Integration and Customization Guide, Release 5.4 Cisco UCS Director API Integration and Customization Guide, Release 5.4 First Published: November 03, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco Unity User Guide--Modified/Abridged

Cisco Unity User Guide--Modified/Abridged --Modified/Abridged Managing Voice Mail Using Your Telephone Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Cisco Nexus 9000 Series NX-OS IP Fabric for Media Solution Guide, Release 7.0(3)I4(2)

Cisco Nexus 9000 Series NX-OS IP Fabric for Media Solution Guide, Release 7.0(3)I4(2) Cisco Nexus 9000 Series NX-OS IP Fabric for Media Solution Guide, Release 7.0(3)I4(2) First Published: 2016-07-15 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

7825-I4, 7828-I4 Hard Disk Firmware Update

7825-I4, 7828-I4 Hard Disk Firmware Update 7825-I4, 7828-I4 Hard Disk Firmware Update October 6, 2010 Document Revision 2 A firmware solution for a hard disk drive issue on the MCS 7825-I4, and 7828-I4 models Contents This document discuss the

More information

Modified LNS Dead-Cache Handling

Modified LNS Dead-Cache Handling First Published: Sept. 30, 2007 Last Updated: Aug. 28, 2008 The feature allows you to display and clear (restart) any Layer 2 Tunnel Protocol (L2TP) Network Server (LNS) entry in a dead-cache (DOWN) state.

More information

Cisco MDS 9000 Family Release Notes for Cisco MDS Fabric Manager Release 3.4(1a)

Cisco MDS 9000 Family Release Notes for Cisco MDS Fabric Manager Release 3.4(1a) Send documentation comments to mdsfeedback-doc@cisco.com Cisco MDS 9000 Family Release Notes for Cisco MDS Fabric Manager Release 3.4(1a) Release Date: August 5, 2008 Part Number: D0 This document describes

More information

Cisco TEO Adapter Guide for SAP ABAP

Cisco TEO Adapter Guide for SAP ABAP Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part

More information

Release Notes for Cisco Secure Services Client Release for Windows Vista

Release Notes for Cisco Secure Services Client Release for Windows Vista Release s for Cisco Secure Services Client Release 5.1.0.60 for Windows Vista October 2009 Contents This release note contains these sections: Contents, page 1 Introduction, page 2 System Requirements,

More information

Cisco 806, Cisco 820 Series, Cisco 830 Series, SOHO 70 Series and SOHO 90 Series Routers ROM Monitor Download Procedures

Cisco 806, Cisco 820 Series, Cisco 830 Series, SOHO 70 Series and SOHO 90 Series Routers ROM Monitor Download Procedures Cisco 806, Cisco 820 Series, Cisco 830 Series, SOHO 70 Series and SOHO 90 Series Routers ROM Monitor Download Procedures November 18, 2004 This document contains procedures for downloading ROM Monitor

More information

PPPoE on ATM. Finding Feature Information. Contents

PPPoE on ATM. Finding Feature Information. Contents PPPoE on ATM First Published: March 27, 2000 Last Updated: November 20, 2009 The PPPoE on ATM feature provides the ability to connect a netwk of hosts over a simple bridging-access device to a remote access

More information

Cisco Nexus 7000 Series Switches Configuration Guide: The Catena Solution

Cisco Nexus 7000 Series Switches Configuration Guide: The Catena Solution Cisco Nexus 7000 Series Switches Configuration Guide: The Catena Solution First Published: 2016-12-21 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco Virtual Office End User Instructions for Cisco 1811 Router Set Up at Home or Small Office

Cisco Virtual Office End User Instructions for Cisco 1811 Router Set Up at Home or Small Office Cisco Virtual Office End User Instructions for Cisco 1811 Router Set Up at Home or Small Office Introduction This document describes the end-user instructions to deploy the Cisco Virtual Office (CVO) for

More information

Release Notes for Cisco Broadband Access Center 3.5

Release Notes for Cisco Broadband Access Center 3.5 Release Notes for Cisco Broadband Access Center 3.5 Revised: June 15, 2009, These release notes describe new software features, bug fixes, and documentation for Cisco Broadband Access Center (Cisco BAC),

More information

My Devices User Guide

My Devices User Guide August 30 th, 2017 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS(6387) Fax: 408 527-0883 CCDE, CCENT, CCSI,

More information