Table Of Contents
P Commands
pinning
pinning id (virtual Ethernet interface)
port
port-channel load-balance ethernet
private-vlan
private-vlan association
private-vlan synchronize
protocol vmware-vim
provision
P Commands
This chapter describes the Cisco NX-OS Ethernet and virtual Ethernet commands that begin with P.
pinning
To configure pinning options for an interface, use the pinning command. To revert to the default settings, use the no form of this command.
pinning {control-vlan | packet-vlan} sub_group_ID
no pinning {control-vlan | packet-vlan}
Syntax Description
control-vlan
|
Configures pinning for control VLANs.
|
packet-vlan
|
Configures pinning for packet VLANs.
|
sub_group_ID
|
Sub-group ID. The range is from 0 to 31.
|
Command Default
None
Command Modes
Interface configuration mode
Command History
Release
|
Modification
|
6.0(2)N1(1)
|
This command we introduced.
|
Usage Guidelines
This command does not require a license.
Examples
This example shows how to configure packet VLAN pinning for an interface:
switch# configure terminal
switch(config)# interface ethernet 1/5
switch(config-if)# pinning packet-vlan 5
Related Commands
Command
|
Description
|
show running-config
|
Displays the running system configuration information.
|
pinning id (virtual Ethernet interface)
To pin virtual Ethernet interface traffic to a specific subgroup, use the pinning id command. To remove the configuration, use the no form of this command.
pinning id sub-group-id
no pinning id
Syntax Description
sub-group-id
|
ID number of the subgroup. The range is from 0 to 31.
|
Command Default
None
Command Modes
Virtual Ethernet interface configuration mode
Command History
Release
|
Modification
|
6.0(2)N1(1)
|
This command we introduced.
|
Usage Guidelines
This command does not require a license.
Examples
This example shows how to pin a virtual Ethernet interface to subgroup 3:
switch# configure terminal
switch(config)# interface vethernet 1
switch(config-if)# pinning id 3
Related Commands
Command
|
Description
|
show interface vethernet
|
Displays the virtual Ethernet interface configuration information.
|
show running-config intefrace vethernet
|
Displays the running configuration information for a specific virtual Ethernet interface, including the pinning configuration.
|
port
To configure a unified port on a Cisco Nexus 5548UP switch or Cisco Nexus 5596UP switch, use the port command. To remove the unified port, use the no form of this command.
port port-number type {ethernet | fc}
no port port-number type {ethernet | fc}
Syntax Description
port-number
|
Port number. The range is from 1 to 199.
|
type
|
Specifies the type of port to configure on a slot in a chassis.
|
ethernet
|
Specifies an Ethernet port.
|
fc
|
Specifies a Fibre Channel (FC) port.
|
Command Default
None
Command Modes
Slot configuration mode
Command History
Release
|
Modification
|
6.0(2)N1(1)
|
This command we introduced.
|
Usage Guidelines
Unified ports allow you to configure ports as Ethernet, native Fibre Channel or Fibre Channel over Ethernet (FCoE) ports. By default, the ports are Ethernet ports but you can change the port mode to Fibre Channel on the following unified ports:
•
Any port on the Cisco Nexus 5548UP switch or the Cisco Nexus 5596UP switch.
•
The ports on the Cisco N55-M16UP expansion module that is installed in a Cisco Nexus 5548P switch.
You must configure Ethernet ports and FC ports in a specified order:
•
FC ports must be configured from the last port of the module.
•
Ethernet ports must be configured from the first port of the module.
If the order is not followed, the following errors are displayed:
ERROR: Ethernet range starts from first port of the module
ERROR: FC range should end on last port of the module
On a Cisco Nexus 5548UP switch, the 32 ports of the main slot (slot1) are unified ports. The Ethernet ports start from port 1/1 to port 1/32. The FC ports start from port 1/32 backwards to port 1/1.
Examples
This example shows how to configure a unified port on a Cisco Nexus 5548UP switch or Cisco Nexus 5596UP switch:
switch# configure terminal
switch(config-slot)# port 32 type fc
switch(config-slot)# copy running-config startup-config
switch(config-slot)# reload
This example shows how to configure a unified port on a Cisco N55-M16UP expansion module:
switch# configure terminal
switch(config-slot)# port 32 type fc
switch(config-slot)# copy running-config startup-config
switch(config-slot)# reload
This example shows how to configure 20 ports as Ethernet ports and 12 as FC ports:
switch# configure terminal
switch(config-slot)# port 21-32 type fc
switch(config-slot)# copy running-config startup-config
switch(config-slot)# reload
Related Commands
Command
|
Description
|
slot
|
Enables preprovisioning of features or interfaces of a module on a slot in a chassis.
|
reload
|
Reloads the switch and all attached Fabric Extender chassis or a specific Fabric Extender.
|
port-channel load-balance ethernet
To configure the load-balancing method among the interfaces in the channel-group bundle, use the port-channel load-balance ethernet command. To return the system priority to the default value, use the no form of this command.
port-channel load-balance ethernet method [hash-polynomial]
no port-channel load-balance ethernet [method]
Syntax Description
method
|
Load-balancing method. See the "Usage Guidelines" section for a list of valid values.
|
hash-polynomial
|
(Optional) Hash polynomial that is used to determine the egress port selected for a port channel. See the "Usage Guidelines" section for a list of valid values.
Note This is applicable only on a Cisco Nexus 5548 switch and a Cisco Nexus 5596 switch.
|
Command Default
Loads distribution on the source and destination MAC address.
The default hash polynomial is CRC8a.
Command Modes
Global configuration mode
Command History
Release
|
Modification
|
6.0(2)N1(1)
|
This command we introduced.
|
Usage Guidelines
The valid load-balancing method values are as follows:
•
destination-ip—Loads distribution on the destination IP address.
•
destination-mac—Loads distribution on the destination MAC address.
•
destination-port—Loads distribution on the destination port.
•
source-destination-ip—Loads distribution on the source and destination IP address.
•
source-destination-mac—Loads distribution on the source and destination MAC address.
•
source-destination-port—Loads distribution on the source and destination port.
•
source-ip—Loads distribution on the source IP address.
•
source-mac—Loads distribution on the source MAC address.
•
source-port—Loads distribution on the source port.
Use the option that provides the balance criteria with the greatest variety in your configuration. For example, if the traffic on an EtherChannel is going only to a single MAC address and you use the destination MAC address as the basis of EtherChannel load balancing, the EtherChannel always chooses the same link in that EtherChannel; using source addresses or IP addresses might result in better load balancing.
The Cisco Nexus 5548 switch and Cisco Nexus 5596 switch support 8 hash polynomials that can be used for compression on the hash-parameters (software-configurable selection of source and destination MAC addresses, source and destination IP addresses, and source and destination TCP and UDP ports). Depending on variations in the load-balancing method for egress traffic flows from a port channel, different polynomials could provide different load distribution results.
The valid load-balancing hash-polynomial values are as follows:
•
CRC8a—Hash polynomial CRC8a.
•
CRC8b—Hash polynomial CRC8b.
•
CRC8c—Hash polynomial CRC8c.
•
CRC8d—Hash polynomial CRC8d.
•
CRC8e—Hash polynomial CRC8e.
•
CRC8f—Hash polynomial CRC8f.
•
CRC8g—Hash polynomial CRC8g.
•
CRC8h—Hash polynomial CRC8h.
Note
The hash polynomial that you choose affects both the multicast and unicast traffic egressing from all the local port channels. The hash polynomial does not affect the port channels whose member ports are on a Cisco Nexus 2148T Fabric Extender, Cisco Nexus 2232P Fabric Extender, or Cisco Nexus 2248T Fabric Extender.
Examples
This example shows how to set the load-balancing method to use the source IP:
switch(config)#
port-channel load-balance ethernet source-ip
This example shows how to set the load-balancing method to use the source IP and the CRC8c polynomial to hash a flow to obtain a numerical value that can be used to choose the egress physical interface on a Cisco Nexus 5548 switch:
switch(config)#
port-channel load-balance ethernet source-ip CRC8c
Related Commands
Command
|
Description
|
show port-channel load-balance
|
Displays information on EtherChannel load balancing.
|
private-vlan
To configure private VLANs, use the private-vlan command. To return the specified VLANs to normal VLAN mode, use the no form of this command.
private-vlan {isolated | community | primary}
no private-vlan {isolated | community | primary}
Syntax Description
isolated
|
Designates the VLAN as an isolated secondary VLAN.
|
community
|
Designates the VLAN as a community secondary VLAN.
|
primary
|
Designates the VLAN as the primary VLAN.
|
Command Default
None
Command Modes
VLAN configuration mode
Command History
Release
|
Modification
|
6.0(2)N1(1)
|
This command we introduced.
|
Usage Guidelines
You must enable private VLANs by using the feature private-vlan command before you can configure private VLANs. The commands for configuring private VLANs are not visible until you enable private VLANs.
If you delete either the primary or secondary VLAN, the ports that are associated with the VLAN become inactive. When you enter the no private-vlan command, the VLAN returns to the normal VLAN mode. All primary and secondary associations on that VLAN are suspended, but the interfaces remain in private VLAN mode. When you reconvert the specified VLAN to private VLAN mode, the original associations are reinstated.
If you enter the no vlan command for the primary VLAN, all private VLAN associations with that VLAN are lost. If you enter the no vlan command for a secondary VLAN, the private VLAN associations with that VLAN are suspended and are reenabled when you recreate the specified VLAN and configure it as the previous secondary VLAN.
You cannot configure VLAN1 or the internally allocated VLANs as private VLANs.
A private VLAN is a set of private ports that are characterized by using a common set of VLAN number pairs. Each pair is made up of at least two special unidirectional VLANs and is used by isolated ports and/or by a community of ports to communicate with routers.
An isolated VLAN is a VLAN that is used by isolated ports to communicate with promiscuous ports. An isolated VLAN's traffic is blocked on all other private ports in the same VLAN. Its traffic can only be received by standard trunking ports and promiscuous ports that are assigned to the corresponding primary VLAN.
A promiscuous port is defined as a private port that is assigned to a primary VLAN.
A community VLAN is defined as the VLAN that carries the traffic among community ports and from community ports to the promiscuous ports on the corresponding primary VLAN.
A primary VLAN is defined as the VLAN that is used to convey the traffic from the routers to customer end stations on private ports.
Multiple community and isolated VLANs are allowed. If you enter a range of primary VLANs, the system uses the first number in the range for the association.
If VLAN Trunking Protocol (VTP) is enabled on a switch, you can configure private VLANs only on a device configured in Transparent mode.
Examples
This example shows how to assign VLAN 5 to a private VLAN as the primary VLAN:
switch# configure terminal
switch(config-vlan)# private-vlan primary
This example shows how to assign VLAN 100 to a private VLAN as a community VLAN:
switch# configure terminal
switch(config-vlan)# private-vlan community
This example shows how to assign VLAN 109 to a private VLAN as an isolated VLAN:
switch# configure terminal
switch(config-vlan)# private-vlan isolated
Related Commands
Command
|
Description
|
feature private-vlan
|
Enables private VLANs.
|
show vlan
|
Displays information about VLANs.
|
show vlan private-vlan
|
Displays information about private VLANs.
|
private-vlan association
To configure the association between a primary VLAN and a secondary VLAN on a private VLAN, use the private-vlan association command. To remove the association, use the no form of this command.
private-vlan association {[add] secondary-vlan-list | remove secondary-vlan-list}
no private-vlan association
Syntax Description
add
|
(Optional) Associates a secondary VLAN to a primary VLAN.
|
secondary-vlan-list
|
Number of the secondary VLAN.
|
remove
|
Clears the association between a secondary VLAN and a primary VLAN.
|
Command Default
None
Command Modes
VLAN configuration mode
Command History
Release
|
Modification
|
6.0(2)N1(1)
|
This command we introduced.
|
Usage Guidelines
You must enable private VLANs by using the feature private-vlan command before you can configure private VLANs. The commands for configuring private VLANs are not visible until you enable private VLANs.
If you delete either the primary or secondary VLAN, the ports that are associated with the VLAN become inactive. When you enter the no private-vlan command, the VLAN returns to the normal VLAN mode. All primary and secondary associations on that VLAN are suspended, but the interfaces remain in private VLAN mode. However, when you reconvert the specified VLAN to private VLAN mode, the original associations are reinstated.
If you enter the no vlan command for the primary VLAN, all private VLAN associations with that VLAN are lost. However, if you enter the no vlan command for a secondary VLAN, the private VLAN associations with that VLAN are suspended and return when you recreate the specified VLAN and configure it as the previous secondary VLAN.
The secondary-vlan-list argument cannot contain spaces. It can contain multiple comma-separated items. Each item can be a single secondary VLAN ID or a hyphenated range of secondary VLAN IDs. The secondary-vlan-list parameter can contain multiple secondary VLAN IDs.
A private VLAN is a set of private ports that are characterized by using a common set of VLAN number pairs. Each pair is made up of at least two special unidirectional VLANs and is used by isolated ports and/or by a community of ports to communicate with routers.
Multiple community and isolated VLANs are allowed. If you enter a range of primary VLANs, the system uses the first number in the range for the association.
Isolated and community VLANs can only be associated with one primary VLAN. You cannot configure a VLAN that is already associated to a primary VLAN as a primary VLAN.
Examples
This example shows how to create a private VLAN relationship between the primary VLAN 14, the isolated VLAN 19, and the community VLANs 20 and 21:
switch(config-vlan)# private-vlan isolated
switch(config-vlan)# private-vlan community
switch(config-vlan)# private-vlan community
switch(config-vlan)# private-vlan primary
switch(config-vlan)# private-vlan association 19-21
This example shows how to remove isolated VLAN 18 and community VLAN 20 from the private VLAN association:
switch(config-vlan)# private-vlan association remove 18,20
Related Commands
Command
|
Description
|
feature private-vlan
|
Enables private VLANs.
|
show vlan
|
Displays information about VLANs.
|
show vlan private-vlan
|
Displays information about private VLANs.
|
private-vlan synchronize
To map the secondary VLANs to the same Multiple Spanning Tree (MST) instance as the primary VLAN, use the private-vlan synchronize command.
private-vlan synchronize
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
MST configuration mode
Command History
Release
|
Modification
|
6.0(2)N1(1)
|
This command we introduced.
|
Usage Guidelines
If you do not map secondary VLANs to the same MST instance as the associated primary VLAN when you exit the MST configuration mode, the device displays a warning message that lists the secondary VLANs that are not mapped to the same instance as the associated VLAN. The private-vlan synchronize command automatically maps all secondary VLANs to the same instance as the associated primary VLANs.
Examples
This example shows how to initialize private VLAN synchronization:
switch(config)# spanning-tree mst configuration
switch(config-mst)# private-vlan synchronize
Related Commands
Command
|
Description
|
show spanning-tree mst configuration
|
Displays information about the MST protocol.
|
spanning-tree mst configuration
|
Enters MST configuration mode.
|
protocol vmware-vim
To enable the VMware Infrastructure Software Development Kit (VI SDK), use the protocol vmware-vim command. To disable the VI SDK, use the no form of this command.
protocol vmware-vim
no protocol vmware-vim
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
SVS connection configuration mode
Command History
Release
|
Modification
|
6.0(2)N1(1)
|
This command we introduced.
|
Usage Guidelines
The VMware VI SDK is published by VMware and it allows clients to talk to a vCenter server.
You must first create an SVS connection before you enable the VMware VI SDK.
This command does not require a license.
Examples
This example shows how to enable the VMware VI SDK:
switch# configure terminal
switch(config)# svs connection SVSConn
switch(config-svs-conn)# protocol vmware-vim
This example shows how to disable the VMware VI SDK:
switch# configure terminal
switch(config)# svs connection SVSConn
switch(config-svs-conn)# no protocol vmware-vim
Related Commands
Command
|
Description
|
interface vethernet
|
Creates a virtual Ethernet interface.
|
show svs connections
|
Displays SVS connection information.
|
svs connection
|
Enables an SVS connection.
|
provision
To preprovision a module in a chassis slot, use the provision command. To remove a preprovisioned module from a slot, use the no form of this command.
provision model model-name
no provision model [model-name]
Syntax Description
model
|
Specifies the type of module to be provisioned.
|
model-name
|
Module name. The supported modules are as follows:
• N2K-C2148T—Cisco Nexus 2000 Series Fabric Extender 48x1G 4x10G Module
• N2K-C2232P—Cisco Nexus 2000 Series Fabric Extender 32x10G Module
• N2K-C2232TM—Cisco Nexus 2000 Series Fabric Extender 32x10G Module
• N2K-C2248T—Cisco Nexus 2000 Series Fabric Extender 48x1G 4x10G Module
• N2K-N2224TP—Cisco Nexus 2000 Series Fabric Extender 24x1G 2x10G SFP+ Module
• N55-M16FP—Cisco 16 port Port Fiber Channel Expansion Module 16 x SFP
• N55-M16P—Cisco 16x10-Gigabit Ethernet Expansion Module
• N55-M16UP—Cisco 16x10-Gigabit Flexible Ethernet Expansion Module
• N55-M8P8FP—Cisco 8 Port 1/2/4/8-Gigabit Fibre Channel + 8 Port 10-Gigabit Ethernet Expansion Module
• N5K-M1008—Cisco 8 Port Fiber Channel Expansion Module 8 x SFP
• N5K-M1060—Cisco 6 Port Fiber Channel Expansion Module 6 x SFP
• N5K-M1404—Expansion Module 4 x 10GBase-T LAN, 4 x Fiber Channel
• N5K-M1600—Cisco 6-port 10 Gigabit Ethernet SFP Module 6 x SFP
|
Command Default
None
Command Modes
Slot configuration mode
Switch profile configuration mode
Command History
Release
|
Modification
|
6.0(2)N1(1)
|
This command we introduced.
|
Usage Guidelines
Use this command to define the modules (line card or Cisco Nexus 2000 Series Fabric Extender) to preprovision. If the card type does not match the card in the slot or the module is not compatible with the chassis, you see the following messages:
ERROR: The card type does not match the card in slot
or
ERROR: This module cannot be configured for this chassis
You can configure features or interfaces (Ethernet, Fibre Channel) on the modules before the modules are inserted in the switch chassis. You can also use this command to manage the configuration of these features or interfaces when the module is offline due to a failure or scheduled downtime. These configurations are applied when the module comes online.
When you preprovision a module by specifying the type of module, platform manager will allow only modules of matching type to come online. If you configure the interfaces for the module without specifying the module type, the configuration is applied when the module comes online, regardless of the module type.
You can preprovision modules and interfaces in a switch profile. The modules and interfaces are preprovisioned when you apply (commit) the switch profile. Once the module is inserted and interfaces are created, the preprovisioning module passes on the configuration to the respective applications before the interfaces come up.
Mutual exclusion is a mechanism where configuration outside the switch profile is not allowed in the switch profile and vice-versa. This requirement is to ensure that configuration in the switch profile is exactly the same on both switches. Preprovisioned configuration is the same as a configuration when the module is online, so mutual exclusion checks would continue to apply normally.
When you downgrade from a release which supports preprovisioning, to an earlier release of Cisco NX-OS that does not support module preprovisioning, you will be prompted to remove preprovisioning configuration that you configured on the switch.
Examples
This example shows how to preprovision a module in slot 2 of the chassis:
switch(config-slot)# provision model N5K-M1404
This example shows how to configure a switch profile to enable a chassis slot for preprovisioning of a module:
Enter configuration commands, one per line. End with CNTL/Z.
switch(config-sync)# switch-profile sp
Switch-Profile started, Profile ID is 1
switch(config-sync-sp)# slot 2
switch(config-sync-sp-slot)# provision model N5K-M1600
switch(config-sync-sp-slot)#
This example shows how to remove a preprovisioned module from a chassis slot:
switch(config-slot)# no provision model N5K-M1404
This example shows how to remove all preprovisioned modules or line cards from a chassis slot:
switch(config-slot)# no provision model
Related Commands
Command
|
Description
|
show module
|
Displays module information.
|
show provision
|
Displays provisioned modules.
|
show switch-profile
|
Displays switch profile information.
|
show running-config exclude-provision
|
Displays the running configuration excluding the preprovisioned features.
|
slot
|
Enables a slot for preprovisioning a module.
|
switch-profile
|
Configures a switch profile.
|