A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - Z

Index

A

access control rule 1-4

access logs 1-4

ACL 1-9

action

drop packet 1-10, 6-3

inspection 1-10, 6-3

log 1-10, 6-3

permit 1-10, 6-3

active-standby mode 1-3

active-standby pair 1-4

administrator 1-11

network 1-9

security 1-9

attribute

custom 1-9, 6-6, 6-7

neutral 1-10, 6-3

port-profile 6-6

virtual infrastructure 6-6

B

backing up files 4-18

banner message

configuring 4-2

C

capacity planning 1-3

Cisco Nexus 1000V Series switch 1-1

Cisco NX-OS 1-1

Cisco VNMC 6-1

CLI

Cisco VSG 2-1

command modes 2-2

EXEC command mode 2-3

prompt 2-1

cloud environments 1-1

command

directing output to a file 4-25

no form 2-7

special characters 2-5

command-line interface (See CLI) 2-1

command mode

summary 2-4

command modes 2-2

command shortcuts 2-5

compliance 1-2

compute infrastructure 1-2

configuration

clearing 4-12

data0 interface 2-4

displaying 4-3

global 2-4

rolling back to previous 4-26

running 2-4

saving 4-11

startup 2-4

zone 2-4

configuration files

backing up 4-18

copying 4-18

deleting 4-21

downloading 4-18

context-sensitive help 2-7

copying files 4-18

current directory

changing 4-14

displaying 4-14

custom attributes 1-4, 1-9, 1-11, 6-6, 6-7

D

data0 interface

configuration 2-4

data interface 6-2

debug 1-11, 6-10

dedicated server 1-3

directories

creating 4-19

deleting 4-20, 4-21

display current 4-14

listing files 4-15

moving files 4-21

drop packet 1-10, 6-4

E

environment

structured 1-4

VM 1-4

ESX 1-9

ESX host 6-2

Ethernet 1-9

F

failure, switchover 5-10

features, new and changed (table) i-vii

files

compressing 4-22

copying or backing up 4-18

deleting 4-21

displaying checksums 4-29

displaying contents 4-27

displaying last lines 4-29

moving 4-21

uncompressing 4-22

file systems

changing directories 4-14

creating directories 4-19

deleting directories 4-20

displaying current directory 4-14

listing files 4-15

specifying 4-13

firewall policy 1-9, 1-11, 6-7

firewall policy objects 6-1

firewall rule 1-10, 6-3

G

global configuration 2-4

H

heart-beat mechanism 1-7

help 2-7

context-sensitive 2-7

high availability 1-3

displaying status 5-17

host 1-10, 6-3

hypervisor 1-2, 1-8

I

inspection 1-10, 6-4

interface

management 1-8

IP address 1-10, 6-3

VSG 1-9

K

keyboard shortcuts 2-5

L

line-card modules 1-8

log 1-10, 6-4

logical modular switch 1-8

M

management interface 1-8

master-slave relationship 1-7

message and transaction service. See MTS

MTS

description 5-4

N

network administrator 1-9

neutral attribute 1-10, 6-3

NX-OS 1-1

NX-OS high availability

description 5-1

O

object group 1-10, 6-3

operational segregation 1-3

P

permit 1-10, 6-3

persistent storage service. See PSS

physical line-card modules 1-8

policy

ACL 1-9

engine 1-10

QoS 1-9

policy decision 1-2

policy enforcement 1-2

policy engine 1-10

policy evaluation 1-10, 1-11, 6-3, 6-10

policy name 1-9, 1-11, 6-4

policy object 1-11

action 1-10, 6-4

condition 1-10, 6-4

object group 1-10, 6-4

rule 1-10, 6-4

zone 1-11, 6-4

port group 1-9

port profile 1-4, 1-8, 1-9, 1-11, 6-7

VM 1-9

port-profile attributes 6-6

primary role, VSM 5-7

primary VSG 1-3

PSS

global and local synchronization 5-4

private and shared 5-4

Q

QoS 1-9

R

related documents ii-xi

Reset 1-10

restartability

infrastructure 5-3

role, VSM

primary 5-7

secondary 5-7

standalone 5-7

rule condition 1-10, 6-3

rule policy object 6-3

rules 1-10, 6-3

running configuration 2-4

S

secondary role, VSM 5-7

security administrator 1-9

security operations team 1-3

security policies 1-1

security profile 1-4, 1-9, 6-7

security profile templates 1-1

security services 1-9

segmentation

VM 1-9

service firewall log 1-11, 6-10

soft switch 1-8

standalone role, VSM 5-7

standby VSG 1-3

startup configuration 2-4

structured environment 1-4

subnet 1-10, 6-3

supervisor module

role

secondary 5-7

supervisor modules

replacing standby supervisor 5-16

role

primary 5-7

standalone 5-7

switchovers 5-10

guidelines 5-9

syntax error isolation 2-7

T

tenant traffic 1-9

traffic 1-4

external-to-zone 1-4

policy-based 1-4

zone-to-external 1-4

zone-to-zone 1-4

trust-zone

definition 1-4

trust zones 1-1

U

users

displaying 4-30

sending messages 4-31

using help 2-7

V

vApp 1-4

vCenter 1-10, 6-3

vDC 1-4

VEM 1-2

vEthernet 1-9

virtual data center 1-1, 1-2, 1-4

Virtual Ethernet Module (See VEM) 1-2

virtual Ethernet port 1-4

virtual infrastructure attributes 6-6

virtualization 1-4

virtual machine (See VM) 1-1

Virtual Network Management Center (See Cisco VNMC) 6-1

virtual network service datapath 1-2

virtual port 1-9

Virtual Security Gateway (See Cisco VSG) 1-1

Virtual Supervisor Module 1-4

virtual switch 1-4

VLAN 1-4

Data 1-7

HA 1-7

Management 1-7

management 6-2

Service 1-7

VM 1-1

port profile 1-9

segmentation 1-9

VM Data VLAN 1-7

Vmotion 1-9

vMotion 1-4

VM-to-VM communication 1-7

VMware 1-2

VMware vCenter Server 1-9

VMware Virtual Center 1-4

vNIC 1-3

volatile:

switch reboots 4-15

vPath 1-2, 1-9

VSG

firewall policy object 6-2

IP address 1-9

VSG CLI 2-1

VSG configuration 1-11

VSM 1-8

VSMs

manual switchover 5-10

vSphere 1-2, 1-4

vSwitch 6-2

Z

zone 1-10, 6-3

configuration 2-4

zone attribute 1-10, 6-3

zone membership 1-4

zone-to-zone traffic 1-4