Cisco PDF
Cisco PDF
Cisco PDF
c o m
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public
domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome
to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS,
Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS,
Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step,
Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone,
MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase,
SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of
Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0812R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
CONTENTS
Preface lxi
Audience lxi
Organization lxi
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Upgrading Fabric Manager Server and Fabric Manager Standalone Version Using the Fabric Manager
Update Installer 2-39
Integrating Cisco Fabric Manager with Other Management Tools 2-40
Launching Fabric Manager Client in Cisco SAN-OS Release 3.2(1) and Later 5-2
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Health 7-9
Viewing Summary Information 7-9
Viewing Fabric Information 7-10
Viewing Syslog Information 7-11
Viewing Analysis Reports 7-12
Performance 7-13
Viewing Performance Summary Information 7-14
Performance Detail Summary Report 7-15
7-15
Viewing Performance Information for End Devices 7-16
Viewing Performance Information for ISLs 7-17
Viewing Performance Information for NPV Links 7-21
Viewing Performance Information for Flows 7-22
Viewing Performance Information for Gigabit Ethernet and Ethernet Ports 7-23
Viewing Other Statistics 7-23
Viewing Detailed Traffic Information 7-24
Viewing Predicted Future Performance 7-25
Using the Default Values 7-25
Using Your Own Values 7-26
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Inventory 7-28
Viewing Summary Inventory Information 7-28
Viewing Detailed Summary Inventory Information 7-29
Viewing Detailed Information for VSANs 7-29
Viewing Detailed Information for Switches 7-30
Viewing License Information 7-31
Viewing Detailed Information for Modules 7-32
Viewing Detailed Information for End Devices 7-33
Viewing Detailed Information for ISLs 7-34
Viewing Detailed Information for NPV Links 7-35
Viewing Detailed Information for Zones 7-36
Reports 7-37
Creating a Custom Report Template 7-37
Viewing Custom Reports by Template 7-39
Viewing Custom Reports by Users 7-39
Generating Custom Reports by Template 7-40
Modifying a Custom Report Template 7-41
Deleting Custom Reports 7-42
Viewing Scheduled Jobs by Report Template 7-43
Modifying Scheduled Jobs 7-43
Admin 7-44
Recovering a Web Server Password 7-45
Starting, Restarting, and Stopping Services 7-45
Adding, Editing, and Removing Managed Fabrics 7-46
Viewing Trap and Syslog Registration Information 7-48
Configuring Forwarding of Notifications for Events 7-49
Viewing and Disconnecting Clients 7-50
Configuring Fabric Manager Server Preferences 7-51
Adding and Removing Communities 7-51
Configuring AAA Information 7-53
Adding and Removing Users 7-53
Adding and Removing Roles 7-54
Creating Performance Collections 7-56
Configuring Other Statistics 7-57
Configuring Collection Thresholds 7-59
Importing the RRD Statistics Index 7-60
Configuring the RRD Database 7-60
Viewing Log Information 7-62
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
DPVM 28-1
About DPVM Configuration 28-2
Configuring DPVM with the DPVM Wizard 28-2
About DPVM Databases 28-5
Configuring DPVM Config and Pending Databases 28-5
Activating DPVM Config Databases 28-7
Viewing the Pending Database 28-8
About Autolearned Entries 28-8
Enabling Autolearning 28-9
Clearing Learned Entries 28-9
DPVM Database Distribution 28-10
About DPVM Database Distribution 28-10
Disabling DPVM Database Distribution 28-11
About Locking the Fabric 28-11
Locking the Fabric 28-11
Committing Changes 28-12
Discarding Changes 28-13
Clearing a Locked Session 28-13
Database Merge Guidelines 28-13
About Copying DPVM Databases 28-14
Copying DPVM Databases 28-14
Comparing Database Differences 28-14
Default Settings 28-15
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CHAPTER 34 Managing FLOGI, Name Server, FDMI, and RSCN Databases 34-1
FLOGI 34-1
Displaying FLOGI Details 34-1
RSCN 34-5
About RSCN Information 34-5
Displaying RSCN Information 34-5
About the multi-pid Option 34-6
Configuring the multi-pid Option 34-6
Clearing RSCN Statistics 34-7
RSCN Timer Configuration Distribution Using CFS 34-7
Configuring the RSCN Timer with CFS 34-8
Default Settings 34-8
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PART 5 Security
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PART 6 IP Services
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
iSNS 50-67
About iSNS Client Functionality 50-67
Creating an iSNS Client Profile 50-68
About iSNS Server Functionality 50-69
Example Scenario 50-70
Configuring iSNS Servers 50-71
Enabling the iSNS Server 50-71
iSNS Configuration Distribution 50-71
Configuring the ESI Retry Count 50-72
Configuring the Registration Period 50-72
iSNS Client Registration and Deregistration 50-72
Target Discovery 50-72
iSNS Cloud Discovery 50-73
About Cloud Discovery 50-73
Configuring iSNS Cloud Discovery 50-74
Enabling iSNS Cloud Discovery 50-74
Initiating On-Demand iSNS Cloud Discovery 50-74
Configuring Automatic iSNS Cloud Discovery 50-75
Configuring iSNS Cloud Discovery Distribution 50-75
Default Settings 50-75
IPFC 51-5
IPFC Configuration Guidelines 51-5
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FCC 64-1
About FCC 64-1
FCC Process 64-2
Enabling FCC 64-2
Assigning FCC Priority 64-3
QoS 64-3
About Control Traffic 64-3
Enabling or Disabling Control Traffic 64-4
About Data Traffic 64-4
VSAN Versus Zone-Based QoS 64-5
Configuring Data Traffic 64-6
About Class Map Creation 64-6
Creating a Class Map 64-7
About Service Policy Definition 64-8
About Service Policy Enforcement 64-8
About the DWRR Traffic Scheduler Queue 64-8
Changing the Weight in a DWRR Queue 64-9
Example Configuration 64-10
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PART 10 Troubleshooting
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
What do I do if the Fabric Manager or Performance Manager service shows up as disabled in the
Services menu? 67-6
What do I do if I am unable to install Fabric Manager or Device Manager, or run Java, when McAfee
Internet Suite 6.0 Professional is running? 67-7
General 67-7
What do I do if I see errors while monitoring Area chart graphing? 67-7
What do I do if I see "gen error" messages? 67-7
What do I do if disk images in the Device Manager Summary View are not visible? 67-7
What do I do if I am unable to set both the D_S_TOV and E_D_TOV timers in Device Manager? 67-7
What do I do if columns in Device Manager tables are too small? 67-8
What do I do if fabric changes are not propagated onto the map (for example, links don't
disappear)? 67-8
What do I do if the PortChannel creation dialog becomes too small after several uses? 67-8
What do I do if I see errors after IPFC configuration? 67-8
What do I do if Fabric Manager or Device Manager is using the wrong network interface? 67-8
What do I do if I see display anomalies in Fabric Manager or Device Manager? 67-8
What do I do if most of my Physical Attributes catagories disappear? 67-9
What do I do if I cant see the Information pane? 67-9
Why is the active zone set in edit zone always shown in bold (even after successful activation)? 67-9
Can I create a zone with prefix IVRZ or a zone set with name nozonset? 67-9
What do I do when One-Click License Install fails, and I cannot connect to the Cisco website? 67-9
What do I do when Fabric Manager client and Device Manager cannot connect to the switch? 67-10
How do I increase the log window size in Fabric Manager Client? 67-10
When do I do when the FM Server Database fails to start or has a file locking error? 67-10
How do I re-synchronize Fabric Manager Client with Fabric Manager Server? 67-10
How do I rediscover the current fabric? 67-10
How do I rediscover SCSI Targets? 67-10
Windows Issues 67-11
What do I do when text fields show up too small, and I cannot enter any data? 67-11
What do I do when printing causes an application crash? 67-11
What do I do when Windows XP hangs (or I see a blue screen)? 67-11
What do I do when Fabric Manager and Device Manager Icons Disappear? 67-11
What do I do when Device Manager or Fabric Manager window content disappears in Windows
XP? 67-11
What do I do when SCP/SFTP fails when a file is copied from local machine to the switch? 67-12
UNIX Issues 67-12
What do I do when the parent Menus Disappear? 67-12
What do I do when the web browser cannot find web server even it is running? 67-12
How do I fix a "too many open files" error? 67-12
Other 67-13
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
How do I set the map layout so it stays after Fabric Manager restarted? 67-13
What do I do when two switches show on the map, but there is only one switch? 67-13
What does a red/orange/dotted line through the switch mean? 67-13
How do I upgrade without losing map settings? 67-19
How do I preserve historical data when moving Fabric Manager server to new host? 67-19
Are there restrictions when using Fabric Manager across FCIP? 67-19
How do I fix a "Please insure that FM server is running on localhost" message? 67-20
How do I run Cisco Fabric Manager with multiple interfaces? 67-20
Manually specifying an interface for Fabric Manager Server 67-20
Manually specifying an interface for Fabric Manager Client or Device Manager 67-21
How do I configure an HTTP proxy server? 67-21
How do I clear the topology map? 67-21
How can I use Fabric Manager in a mixed software environment? 67-22
How do I fix a "corrupted jar file" error when Launching Fabric Manager? 67-22
How do I search for Devices in a Fabric? 67-22
How do I search in a table? 67-23
How does Fabric Manager Server licensing work? 67-24
How do I manage Multiple Fabrics? 67-24
How can I clear an Orange X Through a Switch caused by license expiration? 67-24
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
HTTP/HTTPS 69-2
WDSL 69-2
Logon Service 69-2
requestToken 69-2
validateToken 69-3
Authentication or Token 69-3
IdentityManager 69-3
San Service 69-4
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
getHost 69-13
getHostByFabric 69-13
getStorages 69-14
getStorageByFabric 69-14
getHostPorts 69-14
Error Codes 69-15
APPENDIX A Launching Fabric Manager in Cisco SAN-OS Releases Prior to 3.2(1) A-1
Setting the Seed Switch in Cisco SAN-OS Releases 3.1(1) to 3.2(1) A-1
Setting the Seed Switch in Releases Prior to Cisco SAN-OS Release 3.1(1) A-3
Security D-2
Events D-2
INDEX
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
This document provides release-specific information for each new and changed feature in Cisco MDS
Fabric Manager Release 4.x software. The Cisco MDS 9000 Family Fabric Manager Configuration
Guide is updated to address each new and changed feature. The latest version of this document is
available at the Cisco MDS 9000 NX-OS Software Configuration Guides website.
Tip The configuration guides created for earlier releases are also listed at the aforementioned website. Each
guide addresses the features introduced or available in those releases. Select and view the configuration
guide pertinent to the software installed in your switch.
To check for additional information about this release, refer to the Cisco MDS 9000 Family Release
Notes available at the Cisco MDS 9000 NX-OS Software Release Notes website.
Table 1 summarizes the new and changed features for the Cisco MDS 9000 Family Fabric Manager
Configuration Guide, and tells you where they are documented. The table includes a brief description of
each new feature and the release in which the change occurred.
Table 1 New and Changed Features for Cisco MDS Fabric Manager Release 4.x
Changed
in
Feature GUI Change Description Release Where Documented
Port Guard and Port New Interface Port Added port guard and port owner 4.1(3a) Chapter 20, Configuring
Owner Guard tab and updated configuration procedures. Interfaces
General tab.
F Port Trunking Trunking GUI accepts F Added information about 4.1(3a) Chapter 24, Configuring
ports and NP ports. configuring F port trunking across Trunking
the chapter including key concepts,
guidelines and restritions, upgrade
and downgrade considerations,
trunking and channeling protocols,
trunk modes, and allowed VSAN
lists.
F and TF Channel creation Added information about 4.1(3a) Chapter 23, Configuring
PortChanneling dialogs accept F ports configuring F and TF PortChannels PortChannels
and NP ports. including guidelines and
restrictions, interface addition, and
compatibility check.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 1 New and Changed Features for Cisco MDS Fabric Manager Release 4.x (continued)
Changed
in
Feature GUI Change Description Release Where Documented
SAN virtual device Create Virtual Device Added information about automatic 4.1(3a) Chapter 27, SAN Device
automatic failover Dialog failover and fallback configuration. Virtualization
and fallback
Table menu Table menu Added information on changes in 4.1(3a) Chapter 5, Fabric
enhancements enhancements Switch Table, ISL Table and End Manager Client
Devices menu options.
Edit Full Zone Backup and Restore Added information on changes in 4.1(3a) Chapter 30, Configuring
Database operations backup and restore operations. and Managing Zones
Flow Configuration Flow Configuration Added new screen in the Flow 4.1(3a) Chapter 8, Performance
Wizard Enhancement Wizard Enhancement Configuration Wizard. Manager
Web Client Interactive Performance Changes in charts display and 4.1(3a) Chapter 7, Fabric
enhancements Manager charts display realtime status information. Manager Web Client
and realtime status.
NX-OS Software As of Release 4.1(1a) and later, the 4.1(1a) All chapters
MDS SAN-OS software name is
changed to MDS NX-OS software.
The earlier release names are
unchanged and all refrerences are
retained.
Supported Platforms Installation options and The server platforms supported for 4.1(1a) Chapter 2, Installing
Information and FM screens Cisco Fabric Manager have been Cisco MDS NX-OS and
Express Install revised in this release. Fabric Manager
Server Admin Tool A perspective view The Server Admin perspective view 4.1(1a) Chapter 5, Fabric
filters out menu items, limits the scope of Fabric Manager Manager Client
buttons, tabs, tables, to FlexAttach configuration and
and configuration relevant data
options that are not
relevant to the server
admin.
Inventory Report SAN Health Report and The FMS inventory switch detail 4.1(1a) Chapter 7, Fabric
Enhancements Template report has been enhanced to include Manager Web Client
a number of summary statistics
useful for creating a more
comprehensive SAN health
report.
FlexAttach New FlexAttach Procedures to use the FlexAttach 4.1(1a) Chapter 14, Configuring
Configuration by Pre-Configure Server, wizards for pre-configuring all or FlexAttach Virtual
Server Administrators Move Server, and selected ports, moving a server to a pWWN
Replace Server wizards different port or switch, and
replacing a server in the same or
different port or switch.
IP Static Peers for New NPV CFS Setup Added IP static peers configuration 4.1(1a) Chapter 13, Using the
CFS over IP wizard steps for CFS distribution over IP. CFS Infrastructure
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 1 New and Changed Features for Cisco MDS Fabric Manager Release 4.x (continued)
Changed
in
Feature GUI Change Description Release Where Documented
SSM Global Upgrade New SSM Globals tab Added SSM global upgrade delay 4.1(1a) Chapter 19, Managing
Delay timer configuration details. Modules
Generation 3 48-Port, New Quick Bandwidth Added configuration guidelines that 4.1(1a) Chapter 22, Configuring
24-Port, and Reservation includes port groups, port rate Generation 2 and
4/44-Port 8-Gbps Configuration window modes, BB_credit buffer allocation, Generation 3 Switching
Fibre Channel in Device Manager for port speed configuration, Modules
modules 8-Gbps modules and the over-subscription ratio restrictions,
Port Rate Mode combining with earlier generation
Configuration window modules, upgrade and downgrade
in Fabric Manager considerations, crossbar
supports 8-Gbps speed management, port channel interface
modes. configuration, example
configurations, and default settings.
DPVM Wizard DPVM Wizard New screens added. 4.1(1a) Chapter 28, Creating
Dynamic VSANs
Call Home Delayed Traps for EMC Added the delayed traps 4.1(1a) Chapter 62, Configuring
Call Home enhancements for EMC Call Home. Call Home
configuration window
in Fabric Manager.
Performance Flow Creation Wizard Added the flow creation wizard for 4.1(1a) Chapter 8, Performance
Manager in Fabric Manager. performance manager. Manager
Configuring NPV NPV Traffic Map tab, New tabs and setup wizard steps are 4.1(1a) Chapter 21, Configuring
Traffic Management Load Balance tab, and added to map external interfaces to N Port Virtualization
NPV Setup Wizard the server interface and to enable
disruptive load balancing.
Configuring SANTap SANTap DVT MSM tab New tabs are added to configure 4.1(1a) Cisco MDS 9000 Family
DVT MSM SANTap DVT MSM 18+4 and SANTap Deployment
9222i. Guide
Configuring RMON RMON 32 and 64 bit New tabs are added to configure 4.1(1a) Chapter 59, Configuring
32 and 64 bit Alarm Alarm tab RMON 32 and 64 bit alarm. RMON
Inventory Summary Report tab. An Inventory switch detail report has 4.1(1a) Chapter 7, Fabric
Detail ReportS additional option to see been enhanced to include a number Manager Web Client
detailed reports in the of summary statistics useful for
summary section. creating a more comprehensive
SAN health reports
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Preface
This preface describes the audience, organization, and conventions of the Cisco MDS 9000 Family
Configuration Guide. It also provides information on how to obtain related documentation.
Audience
This guide is for experienced network administrators who are responsible for configuring and
maintaining the Cisco MDS 9000 Family of multilayer directors and fabric switches.
Organization
The Cisco MDS 9000 Family Fabric Manager Configuration Guide is organized as follows: :
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Document Conventions
Command descriptions use these conventions:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Related Documentation
The documentation set for the Cisco MDS 9000 Family includes the following documents. To find a
document online, use the Cisco MDS NX-OS Documentation Locator at:
http://www.cisco.com/en/US/docs/storage/san_switches/mds9000/roadmaps/doclocater.htm
Release Notes
Cisco MDS 9000 Family Release Notes for Cisco MDS NX-OS Releases
Cisco MDS 9000 Family Release Notes for Storage Services Interface Images
Cisco MDS 9000 Family Release Notes for Cisco MDS 9000 EPLD Images
Compatibility Information
Cisco MDS 9000 NX-OS Hardware and Software Compatibility Information
Cisco MDS NX-OS Release Compatibility Matrix for Storage Service Interface Images
Cisco MDS 9000 Family Interoperability Support Matrix
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Cisco MDS NX-OS Release Compatibility Matrix for IBM SAN Volume Controller Software for
Cisco MDS 9000
Hardware Installation
Cisco MDS 9500 Series Hardware Installation Guide
Cisco MDS 9200 Series Hardware Installation Guide
Command-Line Interface
Cisco MDS 9000 Family CLI Configuration Guide
Cisco MDS 9000 Family Command Reference
Cisco MDS 9000 Family SAN Volume Controller Configuration Guide
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PA R T 1
Getting Started
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 1
Product Overview
The Cisco MDS 9000 Family of multilayer directors and fabric switches offers intelligent
fabric-switching services that realize maximum performance while ensuring high reliability levels. They
combine robust and flexible hardware architecture with multiple layers of network and storage
management intelligence. This powerful combination enables highly available, scalable storage
networks that provide intelligent networking features such as multiprotocol and multitransport
integration, virtual SANs (VSANs), advanced security, sophisticated debug analysis tools, and unified
SAN management.
This chapter lists the hardware features for the Cisco MDS 9000 Family and describes its software
features. It includes the following sections:
Hardware Overview, page 1-1
Cisco NX-OS Software Configuration, page 1-4
Hardware Overview
This section provides an overview of the following Cisco MDS 9000 Family of multilayer directors and
fabric switches:
Cisco MDS 9500 Series multilayer directors
Cisco MDS 9513 multilayer director
Cisco MDS 9509 multilayer director
Cisco MDS 9506 multilayer director
Cisco MDS 9200 Series fabric switches
Cisco MDS 9222i multilayer fabric switch
Cisco MDS 9216i multilayer fabric switch
Cisco MDS 9100 Series fixed configuration fabric switches
Cisco MDS 9134 multilayer switch
Cisco MDS 9124 multilayer switch
Cisco Fabric Switch for HP c-Class BladeSystem
Cisco Fabric Switch for IBM BladeCenter
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Cisco MDS NX-OS Release 4.1(1a) and later are not supported on the MDS 9120, 9140, 9216,
9216A switches, and the MDS 9500 Series Directors that include Supervisor 1 modules. You must
replace Supervisor 1 modules with Supervisor 2 modules.
Supervisor-1 modules and Supervisor-2 modules can only operate in the same chassis during
migration.
The two supervisor modules ensure high availability and traffic load balancing capabilities. The standby
supervisor module provides redundancy if the active supervisor module fails. Supervisor-1 modules
provide management access through a 10/100BASE-T Ethernet port switch and an RS-232 serial port.
Supervisor-2 modules provide management access through a 10/100/1000BASE-T Ethernet port switch
and an RS-232 serial port.
Note As of Cisco MDS SAN-OS Release 3.2(1), the USB ports on the Supervisor-2 module are supported.
USB flash drives connected to these ports may be used for the same functions as media in the external
compact flash slot.
The Cisco MDS 9500 Series directors support the following switching and services modules:
48-port 8-Gbps Fibre Channel switching module
24-port 8-Gbps Fibre Channel switching module
4/44-port 8-Gbps Host Optimized Fibre Channel switching module
48-port 4-Gbps Fibre Channel switching module
24-port 4-Gbps Fibre Channel switching module
12-port 4-Gbps Fibre Channel switching module
4-port 10-Gbps Fibre Channel switching module
32-port 2-Gbps Fibre Channel switching module
18/4-port Multiservice module (MSM-18/4)
18/4-port Multiservice module FIPS
18-port 4-Gbps Fibre Channel switching module
16-port 2-Gbps Fibre Channel switching module
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
18/4-port Multiservice FIPS Module with Federal Information Processing Standard (FIPS) 140-2
Level-3 validation
32-port Storage Services Module
8-port IP Storage Services Module
Refer to the Cisco MDS 9200 Series Hardware Installation Guide and the Cisco MDS 9216 Switch
Hardware Installation Guide.
Note Cisco MDS NX-OS Release 4.1(1a) and later are not supported on the MDS 9120 switch, the MDS 9140
switch, and the MDS 9500 Series Directors that include Supervisor 1 modules. You must replace
Supervisor 1 modules with Supervisor 2 modules.
Cisco Fabric Switch for HP c-Class BladeSystem (24 ports; 14 internal 2/4 Gbps, and 6 full-rate
ports)
Cisco Fabric Switch for IBM BladeCenter (20 ports; 14 internal 2/4 Gbps, and 6 external full-rate
ports)
These fixed configuration switches are packaged in 1 RU enclosures and provide 1-Gbps, 2-Gbps,
4-Gbps, or 10 Gbps autosensing Fibre Channel ports. Besides Telnet access, a 10/100BASE-T Ethernet
port provides switch access.
Note Switches in the Cisco MDS 9100 Series do not have a COM1 port (RS-232 serial port).
Note Fabric Manager also manages Cisco MDS 9020 switches running FabricWare 2.1. For more information,
refer to the Cisco MDS 9020 Fabric Switch Configuration Guide and Command Reference.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IP
137440
network RADIUS server
CLI
With the CLI, you can type commands at the switch prompt, and the commands are executed when you
press the Enter key. The CLI parser provides command help, command completion, and keyboard
sequences that allow you to access previously executed commands from the buffer history.
For more information on configuring the Cisco MDS switch using the CLI, refer to the Cisco MDS 9000
CLI Configuration Guide.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Resource Manager Essentials (RME) versions 3.4 and 3.5 provide support for switches in the Cisco MDS
9000 Family. Device Updates (DU) are available on Cisco.com (http://www.cisco.com/).
Continue reading this book for more information on configuring the Cisco MDS switch using the Cisco
MDS 9000 Family Fabric Manager.
Basic Configuration
These sections contain the minimum information you need to get your switch up and running.
Setting Up the Switch (Starting a Switch in the Cisco MDS 9000 Family, page 2-1)
Installing Fabric Manager (Installing the Management Software, page 2-18)
Fabric Manager Server (Chapter 3, Fabric Manager Server)
Fabric Manager Client (Chapter 5, Fabric Manager Client)
Device Manager (Chapter 6, Device Manager)
Fabric Manager Web Services (Chapter 7, Fabric Manager Web Client)
Installing licenses (Chapter 10, Obtaining and Installing Licenses)
Activating additional ports (Chapter 11, On-Demand Port Activation Licensing)
Configuring the minimum requirements:
Initial configuration (Chapter 12, Initial Configuration)
VSANs (Chapter 26, Configuring and Managing VSANs.)
Interfaces (Chapter 20, Configuring Interfaces)
Zones and zone sets (Chapter 30, Configuring and Managing Zones.)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Advanced Configuration
These sections contain additional configuration information for NX-OS software and the MDS 9000
Family of switches and includes the following topics:
Switch Configuration, page 1-7
Fabric Configuration, page 1-7
Security, page 1-7
IP Services, page 1-8
Intelligent Storage Services, page 1-8
Network and Switch Monitoring, page 1-8
Traffic Management, page 1-8
Switch Configuration
On-demand port activation licensing (Chapter 11, On-Demand Port Activation Licensing)
Generation 2 switching modules (Chapter 22, Configuring Generation 2 and Generation 3
Switching Modules)
High Availability (Chapter 17, Configuring High Availability)
N-Port Virtualization (Chapter 21, Configuring N Port Virtualization)
Trunking (Chapter 24, Configuring Trunking)
PortChannels (Chapter 23, Configuring PortChannels)
Domains (Chapter 25, Configuring Domain Parameters)
Fabric Configuration
Security
Users and Roles (Chapter 32, Configuring Users and Common Roles)
SNMP (Chapter 40, Configuring SNMP)
RADIUS and TACACS+ (Chapter 41, Configuring RADIUS and TACACS+)
Access lists for IPv4 and IPv6 (Chapter 42, Configuring IPv4 and IPv6 Access Control Lists)
Digital certificates (Chapter 43, Configuring Certificate Authorities and Digital Certificates)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IPsec for network security (Chapter 44, Configuring IPsec Network Security)
FC-SP for fabric security (Chapter 45, Configuring FC-SP and DHCHAP)
Port security (Chapter 46, Configuring Port Security)
Fabric binding (Chapter 47, Configuring Fabric Binding)
IP Services
SCSI flow services (Chapter 55, Configuring SCSI Flow Services and Statistics)
Fibre Channel write acceleration (Chapter 56, Configuring Fibre Channel Write Acceleration
SANTap (Cisco MDS 9000 Family SANTap Deployment Guide)
Traffic Management
CH A P T E R 2
Installing Cisco MDS NX-OS and Fabric Manager
The Cisco Fabric Manager is a set of network management tools that supports Secure Simple Network
Management Protocol version 3 (SNMPv3). It provides a graphical user interface (GUI) that displays
real-time views of your network fabrics, and lets you manage the configuration of Cisco MDS 9000
Family devices and third-party switches.
This chapter describes how to install Cisco Fabric Manager.
This chapter contains the following sections:
Starting a Switch in the Cisco MDS 9000 Family, page 2-1
Initial Setup Routine, page 2-2
Accessing the Switch, page 2-12
Where Do You Go Next?, page 2-13
About Cisco Fabric Manager, page 2-13
Installing the Management Software, page 2-18
Upgrading the Management Software, page 2-38
Upgrading Fabric Manager Server and Fabric Manager Standalone Version Using the Fabric
Manager Update Installer, page 2-39
Integrating Cisco Fabric Manager with Other Management Tools, page 2-40
Running Fabric Manager Behind a Firewall, page 2-40
Uninstalling the Management Software, page 2-43
Note You must use the CLI for initial switch start up.
Step 1 Verify the following physical connections for the new Cisco MDS 9000 Family switch:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The console port is physically connected to a computer terminal (or terminal server).
The management 10/100 Ethernet port (mgmt0) is connected to an external hub, switch, or router.
Refer to the Cisco MDS 9000 Family Hardware Installation Guide (for the required product) for more
information.
Tip Save the host ID information for future use (for example, to enable licensed features). The host
ID information is provided in the Proof of Purchase document that accompanies the switch.
Step 2 Verify that the default console port parameters are identical to those of the computer terminal (or
terminal server) attached to the switch console port:
9600 baud
8 data bits
1 stop bit
No parity
Step 3 Power on the switch. The switch boots automatically and the switch# prompt appears in your terminal
window.
Note The IP address can only be configured from the CLI. When you power up the switch for the first time,
assign the IP address. After you perform this step, the Cisco MDS 9000 Family Fabric Manager can
reach the switch through the management port.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Destination prefix, destination prefix subnet mask, and next hop IP address, if you want to
enable IP routing. Also, provide the IP address of the default network (optional).
Otherwise, provide an IP address of the default gateway (optional).
SSH service on the switchTo enable this optional service, select the type of SSH key (dsa/rsa/rsa1)
and number of key bits (768 to 2048).
DNS IP address (optional).
Default domain name (optional).
NTP server IP address (optional).
SNMP community string (optional).
Switch nameThis is your switch prompt (optional).
Note Be sure to configure the IP route, the IP default network address, and the IP default gateway address to
enable SNMP access. If IP routing is enabled, the switch uses the IP route and the default network IP
address. If IP routing is disabled, the switch uses the default gateway IP address.
Note You should verify that the Fabric Manager Server hostname entry exists on the DNS server, unless the
Fabric Manager Server is configured to bind to a specific interface during installation.
Default Login
All Cisco MDS 9000 Family switches have the network administrator as a default user (admin). You
cannot change the default user at any time (see the Role-Based Authorization section on page 39-1).
You have an option to enforce secure password for any switch in the Cisco MDS 9000 Family. If a
password is trivial (short, easy-to-decipher), your password configuration is rejected. Be sure to
configure a secure password (see the User Accounts section on page 39-10). If you configure and
subsequently forget this new password, you have the option to recover this password (see the
Recovering the Administrator Password section on page 39-20).
Note Starting from NX-OS Release 4.x, secure password is enforced on all Cisco MDS 9000 Family switches
unless disabled by the user.
Setup Options
The setup scenario differs based on the subnet to which you are adding the new switch. You must
configure a Cisco MDS 9000 Family switch with an IP address to enable management connections from
outside of the switch.
Note Some concepts such as out-of-band management and in-band management are briefly explained here.
These concepts are explained in more detail in subsequent chapters.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In-band managementThis feature provides IP over Fibre Channel (IPFC) to manage the switches.
The in-band management feature is transparent to the network management system (NMS). Instead
of conventional Ethernet physical media, switches in the Cisco MDS 9000 Family use IPFC as the
transport mechanism (see Figure 2-1 and Chapter 51, Configuring IP Services).
Router
Console Out of band IP address IP
connection management 172.16.1.1 network
subnetwork
Telnet or CLI
SSH
Switch 2
DNS server
mgmt 0 GUI
(IP address:
172.16.1.2)
SNMP
Management LAN
79936
(Ethernet connection)
Note Press Ctrl-C at any prompt to skip the remaining configuration options and proceed with what is
configured until that point. Entering a new password for the administrator is a requirement and cannot
be skipped.
Tip If you do not wish to answer a previously configured question, or if you wish to skip answers to any
questions, press Enter. If a default answer is not available (for example, switch name), the switch uses
what was previously configured and skips to the next question.
Note You can configure both in-band and out-of-band configuration together by entering Yes in both Step 11c
and Step 11d in the following procedure.
To configure the switch for first time out-of-band access, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Power on the switch. Switches in the Cisco MDS 9000 Family boot automatically.
Do you want to enforce secure password standard (Yes/No)?
Step 2 Enter Yes to enforce secure password.
a. Enter the administrator password
Enter the password for admin: 2008asdf*lkjh17
b. Confirm the administrator password.
Confirm the password for admin: 2008asdf*lkjh17
Tip If a password is trivial (short, easy to decipher), your password configuration is rejected. Be sure
to configure a secure password as shown in the sample configuration. Passwords are
case-sensitive. You must explicitly configure a password that meets the requirements listed in
the User Accounts section on page 39-10.
Note This setup utility will guide you through the basic configuration of the system. Setup configures
only enough connectivity for management of the system.
Please register Cisco MDS 9000 Family devices promptly with your supplier. Failure to
register may affect response times for initial service calls. MDS devices must be
registered to receive entitled support services.
Press Enter anytime you want to skip any dialog. Use ctrl-c at anytime to skip away
remaining dialogs.
Would you like to enter the basic configuration dialog (yes/no): yes
The setup utility guides you through the basic configuration process. Press Ctrl-C at any prompt to end
the configuration process.
Step 4 Enter the new password for the administrator (admin is the default).
Enter the password for admin: admin
While configuring your initial setup, you can create an additional user account (in the network-admin
role) besides the administrators account. See the Role-Based Authorization section on page 39-1 for
information on default roles and permissions.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
b. Enter the SNMPv3 password (minimum of eight characters). The default is admin123.
SNMPv3 user authentication password: admin_pass
Step 7 Enter yes (no is the default) to configure the read-only or read-write SNMP community string.
Configure read-write SNMP community string (yes/no) [n]: yes
Note The switch name is limited to 32 alphanumeric characters. The default is switch.
Step 10 Enter yes (yes is the default) to configure the default gateway (recommended).
Configure the default-gateway: (yes/no) [y]: yes
Step 11 Enter yes (no is the default) to configure advanced IP options such as in-band management, static routes,
default network, DNS, and domain name.
Configure Advanced IP options (yes/no)? [n]: yes
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Be sure to configure the IP route, the default network IP address, and the default gateway IP
address to enable SNMP access. If IP routing is enabled, the switch uses the IP route and the
default network IP address. If IP routing is disabled, the switch uses the default gateway IP
address.
d. Enter yes (no is the default) to configure the default network (recommended).
Configure the default network: (yes/no) [n]: yes
Note The default network IP address is the destination prefix provided in Step 11c .
Step 13 Enter yes (no is the default) to enable the SSH service.
Enabled SSH server? (yes/no) [n]: yes
Step 14 Enter the SSH key type (see the Generating the SSH Server Key Pair section on page 39-17) that you
would like to generate.
Type the SSH key you would like to generate (dsa/rsa)? dsa
Step 15 Enter the number of key bits within the specified range.
Enter the number of key bits? (768 to 2048): 768
Step 16 Enter yes (no is the default) to configure the NTP server.
Configure NTP server? (yes/no) [n]: yes
Configure clock? (yes/no) [n] :yes
Configure clock? (yes/no) [n] :yes
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 17 Enter noshut (shut is the default) to configure the default switch port interface to the shut state.
Configure default switchport interface state (shut/noshut) [shut]: noshut
Step 18 Enter on (on is the default) to configure the switch port trunk mode.
Configure default switchport trunk mode (on/off/auto) [on]: on
Step 20 Enter permit (deny is the default) to deny a default zone policy configuration.
Configure default zone policy (permit/deny) [deny]: permit
You see the new configuration. Review and edit the configuration that you have just entered.
Step 22 Enter no (no is the default) if you are satisfied with the configuration.
The following configuration will be applied:
username admin password admin_pass role network-admin
username user_name password user_pass role network-admin
snmp-server community snmp_community ro
switchname switch
interface mgmt0
ip address ip_address subnet_mask
no shutdown
ip routing
ip route dest_prefix dest_mask dest_address
ip default-network dest_prefix
ip default-gateway default_gateway
ip name-server name_server
ip domain-name domain_name
telnet server enable
ssh key dsa 768 force
ssh server enable
ntp server ipaddr ntp_server
system default switchport shutdown
system default switchport trunk mode on
system default port-channel auto-create
zone default-zone permit vsan 1-4093
zoneset distribute full vsan 1-4093
Step 23 Enter yes (yes is default) to use and save this configuration:
Use this configuration and save it? (yes/no) [y]: yes
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution If you do not save the configuration at this point, none of your changes are updated the next
time the switch is rebooted. Type yes to save the new configuration. This ensures that the
kickstart and system images are also automatically configured (see Chapter 15, Software
Images).
Note You can configure both in-band and out-of-band configuration together by entering Yes in both Step 9c
and Step 9d in the following procedure.
To configure a switch for first time in-band access, follow these steps:
Step 1 Power on the switch. Switches in the Cisco MDS 9000 Family boot automatically.
Step 2 Enter the new password for the administrator.
Enter the password for admin: 2004asdf*lkjh18
Please register Cisco MDS 9000 Family devices promptly with your supplier. Failure to
register may affect response times for initial service calls. MDS devices must be
registered to receive entitled support services.
Press Enter incase you want to skip any dialog. Use ctrl-c at anytime to skip away
remaining dialogs.
Would you like to enter the basic configuration dialog (yes/no): yes
The setup utility guides you through the basic configuration process. Press Ctrl-C at any prompt to end
the configuration process.
Step 4 Enter no (no is the default) if you do not wish to create additional accounts.
Create another login account (yes/no) [no]: no
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The switch name is limited to 32 alphanumeric characters. The default is switch.
Step 7 Enter no (yes is the default) at the configuration prompt to configure out-of-band management.
Continue with Out-of-band (mgmt0) management configuration? [yes/no]: no
Step 8 Enter yes (yes is the default) to configure the default gateway.
Configure the default-gateway: (yes/no) [y]: yes
Step 9 Enter yes (no is the default) to configure advanced IP options such as in-band management, static routes,
default network, DNS, and domain name.
Configure Advanced IP options (yes/no)? [n]: yes
a. Enter yes (no is the default) at the in-band management configuration prompt.
Continue with in-band (VSAN1) management configuration? (yes/no) [no]: yes
f. Enter no (no is the default) to skip the default domain name configuration.
Configure the default domain name? (yes/no) [n]: no
Step 11 Enter yes (no is the default) to enable the SSH service.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 12 Enter the SSH key type (see the Generating the SSH Server Key Pair section on page 39-17) that you
would like to generate.
Type the SSH key you would like to generate (dsa/rsa/rsa1)? rsa
Step 13 Enter the number of key bits within the specified range.
Enter the number of key bits? (768 to 1024): 1024
Step 15 Enter shut (shut is the default) to configure the default switch port interface to the shut state.
Configure default switchport interface state (shut/noshut) [shut]: shut
Note The management Ethernet interface is not shut down at this pointonly the Fibre Channel,
iSCSI, FCIP, and Gigabit Ethernet interfaces are shut down.
Step 16 Enter auto (off is the default) to configure the switch port trunk mode.
Configure default switchport trunk mode (on/off/auto) [off]: auto
Step 17 Enter deny (deny is the default) to deny a default zone policy configuration.
Configure default zone policy (permit/deny) [deny]: deny
Disables the switch-wide default for the full zone set distribution feature.
You see the new configuration. Review and edit the configuration that you have just entered.
Step 19 Enter no (no is the default) if you are satisfied with the configuration.
The following configuration will be applied:
username admin password admin_pass role network-admin
snmp-server community snmp_community rw
switchname switch
interface vsan1
ip address ip_address subnet_mask
no shutdown
ip default-gateway default_gateway
no telnet server enable
ssh key rsa 1024 force
ssh server enable
no system default switchport shutdown
system default switchport trunk mode auto
no zone default-zone permit vsan 1-4093
no zoneset distribute full vsan 1-4093
Step 20 Enter yes (yes is default) to use and save this configuration.
Use this configuration and save it? (yes/no) [y]: yes
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution If you do not save the configuration at this point, none of your changes are updated the next
time the switch is rebooted. Type yes to save the new configuration. This ensures that the
kickstart and system images are also automatically configured (see Chapter 15, Software
Images).
Press Enter incase you want to skip any dialog. Use ctrl-c at anytime
to skip away remaining dialogs.
Would you like to enter the basic configuration dialog (yes/no): yes
The setup utility guides you through the basic configuration process.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Router
Console Out of band IP address IP
connection management 172.16.1.1 network
subnetwork
Telnet or CLI
SSH
Switch 2
DNS server
mgmt 0 GUI
(IP address:
172.16.1.2)
SNMP
Management LAN
79936
(Ethernet connection)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The MDS switch always checks the local SNMP users before the remote AAA users, unlike the CLI.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Open Internet Explorer and select Tools > Internet Options.
You see the Internet Options dialog box.
Step 2 Select the Connections tab and click LAN Settings.
You see the LAN Settings dialog box.
Step 3 Check the Use a Proxy Server for your LAN check box and click Advanced.
Step 4 Add your server IP Address or local host under the Exceptions section.
Step 5 Click OK to save your changes.
See the Running Fabric Manager Behind a Firewall section on page 2-40.
Device Manager
The Device Manager provides two views of a single switch:
Device View displays a graphic representation of the switch configuration and provides access to
statistics and configuration information.
Summary View displays a summary of xE ports (Inter-Switch Links), Fx ports (fabric ports), and Nx
ports (attached hosts and storage) on the switch, as well as Fibre Channel and IP neighbor devices.
Summary or detailed statistics can be charted, printed, or saved to a file in tab-delimited format. See
Chapter 6, Device Manager.
Performance Manager
Performance Manager presents detailed traffic analysis by capturing data with SNMP. This data is
compiled into various graphs and charts that can be viewed with any web browser. See Chapter 58,
Performance Monitoring.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Of these five layers of storage network management, Cisco Fabric Manager provides tools for device
(element) management and fabric management. In general, the Device Manager is most useful for device
management (a single switch), while Fabric Manager is more efficient for performing fabric
management operations involving multiple switches.
Tools for upper-layer management tasks can be provided by Cisco or by third-party storage and network
management applications. The following summarizes the goals and function of each layer of storage
network management:
Device management provides tools to configure and manage a device within a system or a fabric.
You use device management tools to perform tasks on one device at a time, such as initial device
configuration, setting and monitoring thresholds, and managing device system images or firmware.
Fabric management provides a view of an entire fabric and its devices. Fabric management
applications provide fabric discovery, fabric monitoring, reporting, and fabric configuration.
Resource management provides tools for managing resources such as fabric bandwidth, connected
paths, disks, I/O operations per second (IOPS), CPU, and memory. You can use Fabric Manager to
perform some of these tasks.
Data management provides tools for ensuring the integrity, availability, and performance of data.
Data management services include redundant array of independent disks (RAID) schemes, data
replication practices, backup or recovery requirements, and data migration. Data management
capabilities are provided by third-party tools.
Application management provides tools for managing the overall system consisting of devices,
fabric, resources, and data from the application. Application management integrates all these
components with the applications that use the storage network. Application management
capabilities are provided by third-party tools.
mgmt0
The out-of-band management connection is a 10/100 Mbps Ethernet interface on the supervisor module,
labeled mgmt0. The mgmt0 interface can be connected to a management network to access the switch
through IP over Ethernet. You must connect to at least one Cisco MDS 9000 Family switch in the fabric
through its Ethernet management port. You can then use this connection to manage the other switches
using in-band (Fibre Channel) connectivity. Otherwise, you need to connect the mgmt0 port on each
switch to your Ethernet network.
Each supervisor module has its own Ethernet connection; however, the two Ethernet connections in a
redundant supervisor system operate in active or standby mode. The active supervisor module also hosts
the active mgmt0 connection. When a failover event occurs to the standby supervisor module, the IP
address and media access control (MAC) address of the active Ethernet connection are moved to the
standby Ethernet connection.
IPFC
You can also manage switches on a Fibre Channel network using an in-band IP connection. The Cisco
MDS 9000 Family supports RFC 2625 IP over Fibre Channel, which defines an encapsulation method
to transport IP over a Fibre Channel network.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IPFC encapsulates IP packets into Fibre Channel frames so that management information can cross the
Fibre Channel network without requiring a dedicated Ethernet connection to each switch. This feature
allows you to build a completely in-band management solution.
Note Before upgrading or uninstalling Fabric Manager or Device Manager, make sure any instances of these
applications have been shut down.
Note We recommend that you install the latest version of the Fabric Manager applications. Fabric Manager is
backward-compatible with the Cisco MDS SAN-OS and Cisco FabricWare software running on the
switches. When upgrading, upgrade the Fabric Manager software first, and then upgrade the Cisco MDS
SAN-OS or NX-OS or Cisco FabricWare software on the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Supported Software
Note For the latest information on supported software, refer to the Cisco MDS 9000 Family Release Notes for
Cisco MDS NX-OS Release 4.1(3a).
Cisco Fabric Manager and Cisco Device Manager have been tested with the following software:
Operating Systems
Windows 2003 SP2, Windows XP SP2, Windows XP SP3, Windows Vista SP1 (Enterprise
edition)
Red Hat Enterprise Linux AS Release 4
Solaris (SPARC) 8, 9 and 10
VMWare ESX Server 3.5
Note We support only Windows 2003 SP2 VM created on VMWare ESX Server 3.5
Java
Sun JRE and JDK 1.5(x) and 1.6(x) is supported
Java Web Start 1.5 and 1.6
Browsers
Internet Explorer 6.x and 7.0
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you are upgrading a previous installation of Fabric Manager Server, be sure the previous installation
of the database is running. Do not uninstall the previous version. If the previous version is uninstalled,
the database will not be migrated and your server settings will not be preserved. After you ensure that
the previous installation is running, follow the steps listed in the Installing Fabric Manager section on
page 2-24. Before beginning the upgrade, you must close Fabric Manager and Device Manager.
Upgrading Fabric Manager in Cisco SAN-OS Releases 3.1(2b) and Later to 3.2(1)
When you install Cisco SAN-OS 3.2(1), data is migrated from the Hypersonic HSQL database to either
the PostgreSQL database or Oracle Database 10g Express during the installation. Data is also migrated
from Oracle to Oracle.
Note If you migrate the database from Oracle to Oracle, the schema is updated as required by Cisco SAN-OS
3.2(1).
To install the PostgreSQL database on Windows, click the FM Installer link on the CD. To install Oracle
Database 10g Express, follow the instructions in the Installing Oracle section on page 2-22.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you are installing Cisco SAN-OS Release 3.1(2b) or later, you can also use Oracle Database 10g
Express. Your other choice is PostgreSQL.
Note Be sure to back up all of the rrd file in $INSTALL/pm/db before the upgrade.
Directory Structure
As of Cisco MDS NX-OS Release 4.1(3a), the directory structure has changed to accommodate its future
integration with Nexus 5000 products. By default, the Fabric Manager components are installed on your
computers hard drive, in the C:\Program Files\ folder. The installation path is the root directory on your
computer, such as C:\Program Files\Cisco Systems. Fabric Manager and databases are installed in
application directories, such as C:\Program Files\Cisco Systems\DCM\FM. Table 2-2 and Table 2-3
describe the directory structure for Windows, UNIX and Solaris operating systems.
Directory Description
C:\Program Files\Cisco Systems\ Home directory for Cisco products.
C:\Program Files\Cisco Systems\DCM\ Home directory for Cisco Data Center
Management products.
C:\Program Files\Cisco Systems\DCM\FM Home directory for Fabric Manager
and Device Manager.
C:\Program Files\Cisco Systems\DCM\JBOSS-4.2.2.GA Home directory for JBoss (Fabric
Manager Server infrastructure).
C:\Program Files\Cisco Systems\DCM\DB Home directory for database (Oracle
and PostgreSQL).
C:\Program Files\Cisco Systems\DCM\JRE Home directory for Java Runtime
Environment.
C:\Program Files\Cisco Home directory for Fabric Manager
Systems\DCM\JBOSS-4.2.2.GA\SERVER\FM Server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Directory Description
/usr/local/cisco Home directory for Cisco products.
/usr/local/cisco/dcm/ Home directory for Cisco Data Center
Management products.
/usr/local/cisco/dcm/fm Home directory for Fabric Manager and
Device Manager.
/usr/local/cisco/dcm/jboss-4.2.2.GA Home directory for JBoss (Fabric Manager
Server infrastructure).
/usr/local/cisco/dcm/db Home directory for database (Oracle and
PostgreSQL).
/usr/local/cisco/dcm/jboss-4.2.2.GA/server/fm Home directory for Fabric Manager Server.
Installing Oracle
Note We recommend the Oracle Database 10g Express option for all users who are running Performance
Manager on large fabrics (1000 or more end devices). If you want to use Oracle Database 10g Express,
you must install the database and create a user name and password before continuing with the Fabric
Manager installation.
Step 1 Click the following link to install Oracle Database 10g Express.
http://www.oracle.com/technology/software/products/database/xe/index.html
Note If you have another instance of Oracle already installed on a PC, we recommend that you do not
install the Oracle database on the same PC. In such cases, Fabric Manager can only use the
PostgreSQL database.
Step 2 Run OracleXE.exe to install the Oracle database. Set the password for the system user. The database
administrator uses the password to manage and administer Oracle Database 10g Express server, which
is installed by the Oracle installer.
Step 3 Finish the installation and verify that both services (OracleServiceXE and OracleXETNSListener) are
running from the Services window.
Step 4 Run the following script to change the default Oracle admin port and to create a database account.
C:\> cd c:\oraclexe\app\oracle\product\10.2.0\server\bin
C:\oraclexe\app\oracle\product\10.2.0\server\bin>sqlplus / as sysdba
SQL> exec dbms_xdb.sethttpport(8082);
SQL> GRANT CONNECT,RESOURCE,UNLIMITED TABLESPACE TO SCOTT IDENTIFIED BY
TIGER;
SQL> EXIT;
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The Oracle Database 10g Express option is only supported on Microsoft Windows. It is not
supported on UNIX systems.
Note For information about backing up the Oracle database, go to this location:
http://download.oracle.com/docs/cd/B25329_01/doc/admin.102/b25107/backrest.htm#i1004902. You
canalso use the exp/imp utility at this location:
http://download.oracle.com/docs/cd/B25329_01/doc/admin.102/b25107/impexp.htm#BCEEDCIB.
Note For information about backing up the PostgreSQL database, run the pg_dump utility to have a good
backup. For more information, go to this location:
http://www.postgresql.org/docs/8.1/static/app-pgdump.html.
Note For information about installing Oracle Database 10g and Oracle Database 11g Enterprise Editions , go
to this location: http://www.oracle.com/technology/software/products/database/index.html.
If you are using the Oracle database, you need to install the Oracle JDBC (Java Database Connectivity)
component for Fabric Manager to connect to the database. For more information refer to the Java
Database Connectivity section on page 2-19.
Step 1 For Solaris 8, ensure that the UDP buffer size is at least 64 K.
ndd -set /dev/udp udp_recv_hiwat 65535
ndd -set /dev/udp udp_xmit_hiwat 65535
Step 2 Add the following setting in /etc/system, so that the buffer size will be in effect even after a reboot.
set ndd:udp_recv_hiwat=65535
set ndd:udp_xmit_hiwat=65535
Note Before starting the installation, make sure that you have logged in as a Superuser.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The dump file represents a snapshot of the database at the time of backup.
Backup
To perform a backup of the Fabric Manager database, enter these commands on Linux/Solaris. Assume
INSTALLDIR is the top directory of Fabric Manager installation.
cd $INSTALLDIR/bin
/pgbackup.sh 02252008.data
The backup file 02252008.data will be created in $INSTALLDIR/bin directory. If you want to create it
in a standard backup director provide the full path name of the dump file
Restore
To restore Fabric Manager database, you must have a good backup file, and you must stop the Fabric
Manager server before restoration. Run restore and enter these commands on Linux Solaris. Assume
INSTALLDIR is the top directory of the Fabric Manager installation.
cd $INSTALLDIR/bin
./FMServer.sh stop
./pgrestore.sh 02252008.data
./FMServer.sh start
Note Users installing Fabric Manager must have full administrator privileges to create user accounts and start
services. Users should also have access to all ports. These are the ports used by Fabric Manager Server
and the PostgreSQL database: 1098, 1099, 4444, 4445, 8009, 8083, 8090, 8092, 8093, 514, 5432.
For switches running Cisco MDS 9000 FabricWare, you must install Fabric Manager from the CD-ROM
included with your switch, or you can download Fabric Manager from Cisco.com.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Set Java 1.5 to the path that is to be used for installing Fabric Manager.
Step 2 Copy the Fabric Manager jar file m9000-fm-3.2.0.136.jar from the CD-ROM to a folder on the Solaris
workstation.
Step 3 Launch the installer using the following command:
java -Xms512m Xmx512m -jar m9000-fm-3.2.0.136
Step 4 Follow the on-screen instructions provided in the Fabric Manager management software setup wizard.
When you connect to the server for the first time, Fabric Manager checks to see if you have the correct
Sun Java Virtual Machine version installed on your workstation. Fabric Manager looks for version 1.5(x)
during installation. If required, install the Sun Java Virtual Machine software.
Note You can run CiscoWorks on the same PC as Fabric Manager, even though the Java requirements are
different. When installing the later Java version for Fabric Manager, make sure it does not overwrite the
earlier Java version required for CiscoWorks. Both versions of Java can coexist on your PC.
Note On Windows, remote Fabric Manager installations or upgrades should be done through the console using
VNC or through the Remote Desktop Client (RDC) in console mode (ensuring RDC is used with the
/Console option). This is very important if the default PostgreSQL database is used with Fabric
Manager, because this database requires the local console for all installations and upgrades.
Note Before installing Cisco Fabric Manager on a Windows Vista system, turn the User Account Control
(UAC) off. To turn off UAC, select Start > Control Panel > User Accounts > Turn User Account
Control on or off, clear the Use User Account Control (UAC) to help protect your computer check
box, and then click OK. Click Restart Now to apply the change.
Note Telnet Client application is not installed by default on Microsoft Windows Vista. To install Telnet Client,
select Start > Programs > Control Panel > Click Turn Windows features on or off (if you have UAC
turned on you will need to give it the permission to continue). Check the Telnet Client check box and
then click OK.
As of Cisco MDS NX-OS Release 4.1(3a), Fabric Manager has an express installation option. When you
select this option, Fabric Manager will be installed on your computer with a set of default user
credentials. If the PostgreSQL database is not present on your computer, the installer will install
PostgreSQL. If the PostgreSQL database is present, the installer will upgrade it to latest version. You
may change the default credentials after the installation is complete.
To install (Express) Fabric Manager on Windows, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Click the Express radio button, and then click Next to begin express installation.
Step 6 Check the I accept the terms of the License Agreement check box, and then click Next.
Note Fabric Manager express installation option uses admin as the user name and password as the user
password. The user may change the password after the installation is complete.
Note Fabric Manager express installation option installs the PostgreSQL database with admin as the
user name and password_1_2_3 as the user password. The user may change the password after
the installation is complete.
You see the default credentials in the Cisco Fabric Manager Installer window shown in Figure 2-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You can choose to launch Fabric Manager or Device Manager by checking the Launch Fabric
Manager or Launch Device Manager check boxes. Icons for Fabric Manager and Device
Manager are automatically created on the desktop.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 8 Click Finish to close the Cisco Fabric Manager Installer window.
To install (Custom) Fabric Manager on Windows, follow these steps:
Step 5 Click the Custom radio button, and then click Next to begin the installation.
Step 6 Check the I accept the terms of the License Agreement check box, and then click Next.
You see the Install Options dialog box shown in Figure 2-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You should verify that the Fabric Manager Server hostname entry exists on the DNS server, unless the
Fabric Manager Server is configured to bind to a specific interface during installation.
Note Fabric Manager Standalone is a single application containing Fabric Manager Client and a local version
of Fabric Manager Server bundled together. Fabric Manager Standalone allows you to discover and
monitor the immediate fabric.
Step 8 Select an installation folder on your workstation for Fabric Manager. On Windows, the default location
is C:\Program Files\Cisco Systems\MDS 9000. On a UNIX (Solaris or Linux) machine, the installation
path name is /usr/local/cisco_mds9000 or $HOME/cisco_mds9000, depending on the permissions of
the user doing the installation.
Step 9 Click Next.
You see the Database Options dialog box shown in Figure 2-8.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 10 Click the radio button for either Install PostgreSQL or Use existing DB to specify which database you
want to use.
If you choose Install PostgreSQL, accept the defaults and enter a password. The PostgreSQL database
will be installed.
Note If you choose to install PostgreSQL, you must disable any security software you are running, because
PostgreSQL may not install certain folders or users.
Note Before you install PostgreSQL, remove the cygwin/bin from your environment variable path if Cygwin
is running on your system.
Step 11 If you select Use existing DB, click the radio button for either PostgreSQL 8.1/8.2 or Oracle10g.
Step 12 Click Next in the Database Options dialog box.
You see the User Options dialog box shown in Figure 2-9.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 14 Choose an authentication mode (Local, RADIUS, TACACS or MDS) and click Next.
Note When the MDS radio button is selected, the FM authentication uses the user database in the
switch for authentication.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 2-11 Configuration Options Dialog Box for Fabric Manager Standalone
Step 16 Check the FC Alias and SNMPv3 check boxes as desired and click Install if you are installing Fabric
Manager Standalone.
You see the Configuration Options dialog box for Fabric Manager Server shown in Figure 2-12.
Figure 2-12 Configuration Options Dialog Box for Fabric Manager Server
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 17 Select the local interface, web server port or Fabric Manager server port and check the FC Alias and
SNMPv3 check boxes as desired. Click Install if you are installing Fabric Manager Server. You see the
installation progress in the Cisco Fabric Manager Installer window as shown in Figure 2-13.
Note You can change the Fabric Manager Server port number to a port that is not used by any other
application.
Note You should verify that the Fabric Manager Server hostname entry exists on the DNS server,
unless the Fabric Manager Server is configured to bind to a specific interface during installation.
Note If you check the Use HTTPS Web Server check box, the Web Server Port field is grayed out
and the default port is 443.
Note If you select a specific IP address during installation and change the server host IP address, you
must modify the following two files that are all located in the $INSTALL/conf directory. Change
server.bindaddrs to the new IP address in the server.properties file and change
wrapper.app.parameter.4 to the new IP address in the FMServer.conf file.
Once the installation is finished, you see an installation completed message in the Cisco Fabric Manager
Installer window shown in Figure 2-14.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you installed Fabric Manager Standalone, you can choose to launch Fabric Manager or Device
Manager by checking the Launch Fabric Manager or Launch Device Manager check boxes.
Icons for Fabric Manager and Device Manager are automatically created on the desktop.
Step 18 Click Finish to close the Cisco Fabric Manager Installer window.
If you installed Fabric Manager Server, icons for Fabric Manager and Device Manager are not created
on the desktop until you launch Fabric Manager Client. Follow the instructions in the Launching Fabric
Manager Client in Cisco SAN-OS Release 3.2(1) and Later section on page 5-2 to launch Fabric
Manager Client.
If you checked the Create shortcuts check box, a Cisco MDS 9000 program group is created under Start
> Programs on Windows. This program group contains shortcuts to batch files in the install directory.
On a UNIX (Solaris or Linux) machine, shell scripts are created in the install directory. The shell scripts
that run the programs equivalent to the Windows services are FMServer.sh, all the server-side data and
Performance Manager data are stored in the install directory.
Fabric Manager Client cannot run without Fabric Manager Server. The server component is downloaded
and installed when you download and install Fabric Manager. On a Windows machine you install the
Fabric Manager Server as a service. This service can then be administered using Services in the
Microsoft Windows Control Panel. The default setting for the Fabric Manager Server service is that the
server is automatically started when the machine is rebooted. You can change this behavior by modifying
the properties in Services.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Enter the IP address of the switch in the Address field of your browser.
You see the Installation window for Device Manager shown in Figure 2-15.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Select an installation folder on your workstation for Device Manager. On Windows, the default location
is C:\Program Files\Cisco Systems\MDS 9000. On a UNIX (Solaris or Linux) machine, the installation
path name is /usr/local/cisco_mds9000 or $HOME/cisco_mds9000, depending on the permissions of the
user doing the installation.
Step 6 Click Install.
Once the installation is finished, you see an installation completed message in the Cisco Device Manager
Installer window shown in Figure 2-17.
Step 7 Click Finish to close the Cisco Device Manager Installer window.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 To recreate the shortcut, right-click on the application, and select Install Shortcuts from the shortcut
menu, as shown in Figure 2-20
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note As of Cisco MDS SAN-OS Release 3.x, downgrades are not supported through the installer. To
downgrade Fabric Manager or Device Manager to an earlier release, you need to manually uninstall first
and then reinstall the previous version of Fabric Manager or Device Manager.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
1. The gateway upgrade needs to be performed as the HSQL database data cannot be migrated to the new database.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In Fabric Manager Release 3.2(1) or later, Fabric Manager Client initiates communication with Fabric
Manager Server on the port 9099 for Java Naming Directory and Interface (JNDI) lookup. Fabric
Manager Server redirects the client to 1098 and JBoss directs the request to the appropriate service.
Fabric Manager Server proxy services uses a configurable TCP port (9198 by default) for SNMP
communications between the Fabric Manager Client or Device Manager and Fabric Manager Server.
The Fabric Manager Server component requires two predictable TCP ports to be opened on the firewall
for an incoming connection:
server.port = 9099
server.data.port = 9100
As long as these two ports are open, Fabric Manager Client can connect to the server. Other TCP ports
connected to Fabric Manager Client are initiated by the server, which is behind the firewall.
The following table lists all ports used by Fabric Manager applications:
Communication
Type Port(s) Used
Used by All Applications
SSH Port 22 (TCP)
Telnet Port 23 (TCP)
HTTP Port 80 (TCP)
TFTP Port 69 (UDP)
SNMP Port 161 (UDP)
Syslog Port 514 (UDP)
Used by Fabric Manager Server and Performance Manager
SNMP_TRAP Port 2162 (UDP)
SNMP Picks a random free local port (UDP) or 9198 (TCP) if SNMP proxy is enabled.
Can be changed in server.properties.
Java RMI Ports 9099, 9100 (TCP)
Used by Fabric Manager Client
SNMP Picks a random free local port (UDP) if SNMP proxy is enabled. Can be changed
with the client -Dsnmp.localport option.
Java RMI Picks a free local port between 19199 and 19399 (TCP). Can be changed with
the client -Dclient.portStart and -Dclient.portEnd options. For example,
-Dclient.portStart = 19199 -Dclient.portEnd = 19399.
Used by Device Manager
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Communication
Type Port(s) Used
SNMP_TRAP Picks a free local port between 1163 and 1170 (UDP).
SNMP Picks a random free local port (UDP) or 9198 (TCP) if SNMP proxy is enabled.
Can be changed in server.properties.
Port(s)
Used/Type Service Descriptor Service Name Attribute Name Description
1098 conf/jboss-service.xml jboss:service=Naming RMI Naming This port is for JNDI based naming
(TCP) Service Port services. The client look up this port for
JNDI binding objects and resources.
9099 conf/jboss-service.xml jboss:service=Naming Bootstrap JNP This port is for JNDI based naming
(TCP) Port ( FM services. The client look up this port for
changed 1099 to JNDI binding objects and resources.
9099)
4444 conf/jboss-service.xml jboss:service=invoker,typ RMI /JRMP The org.jboss.invocation.jrmp.
(TCP) e=jrmp ObjectPort server.JRMPInvoker class is an MBean
service that provides the RMI/JRMP
implementation of the Invoker interface.
The JRMPInvoker exports itself as an
RMI server so that when it is used as the
Invoker in a remote client, the
JRMPInvoker stub is sent to the client
instead.
4445 conf/jboss-service.xml jboss:service=invoker,typ Pooled Invoker The org.jboss.invocation.
(TCP) e=pooled pooled.server.PooledInvoker is an
MBean service that provides RMI over a
custom socket transport implementation
of the Invoker interface. The
PooledInvoker exports itself as an RMI
server so that when it is used as the
Invoker in a remote client, the
PooledInvoker stub is sent to the client
instead and invocations use the a custom
socket protocol.
8009 deploy/jbossweb-tomc jboss.web:service=WebSe AJP Connector The AJP Connector element represents a
(TCP) at41.sar/META-INF/jb rver? Connector component that communicates
oss-service.xml with a web connector via the AJP
protocol. This is used for invisibly
integrating JBoss Web into an existing or
a new Apache server.
8083 conf/jboss-service.xml jboss:service=WebService RMI dynamic The WebService MBean provides
(TCP) class loader port dynamic class loading for RMI access to
the server EJBs. Used for web service
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
8092 deploy/jms/oil2-servic jboss.mq:service=Invocati Optimized This port is used for JBossMQ services.
(TCP) e.xml onLayer?,type=OIL2 Invocation JBossMQ is composed of several services
Layer for JMS working together to provide JMS API
level services to client applications.
Optimized Invocation Layer is a service
used by JMS client.
8093 deploy/jms/uil2-servic jboss.mq:service=Invocati Unified This port is used for JBossMQ services.
(TCP) e.xml onLayer?,type=UIL2 Invocation JBossMQ is composed of several services
Layer for JMS working together to provide JMS API
level services to client applications.
Unified Invocation Layer is a service
used by JMS client.
3873 Service end point for JBoss EJB3 Aspect JBoss EJB3 This port used by the client to
(TCP) EJB3 aspect service Service Deployer Invoker communicate with EJB3(Enterprise
JavaBean 3.0) services on JBoss Server.
Step 1 Close all running instances of Fabric Manager and Device Manager.
Step 2 Select Start > Programs > Cisco MDS 9000 > Uninstall to run the uninstall.bat script.
Step 3 When you are prompted with the following message, type Y.
Are you sure you want to Uninstall? Press 'Y' to uninstall, 'A' to remove all files or 'N' to exit. [Y/A/N]
Note When you uninstall the application, the installer will not remove the database as it is shared with
other DCM applications. Option A will remove all the log files and client prefences. Option
Y will not remove the log files and client prefences.
Note Starting from NX-OS Release 4.1(3a), when you uninstall Fabric Manager Server, only Fabric
Manager is removed. Jboss and the database, either PostgreSQL or Oracle, are not removed
because they might be shared with other applications such as Cisco DCNM.
You can also run the batch file (located in the C:\Program Files\Cisco Systems\MDS 9000 folder by
default) directly from the command line.
Note For older installations, delete the .cisco_mds9000 folder. Manually delete all desktop icons and
program menu items.
On a Windows PC, this folder is created under the Documents and Settings folder (for example,
d:\Documents and Settings\Administrator\.cisco_mds9000 if you had installed it as user
Administrator). On a UNIX machine, the default installation folder is /usr/bin.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To uninstall the Fabric Manager applications on a UNIX machine, follow these steps:
Step 1 For all releases starting with Release 2.x, run the shell script
$HOME/cisco_mds9000/Uninstall.sh or /usr/local/cisco_mds9000/uninstall.sh, depending on where
Fabric Manager was installed.
Step 2 For all releases starting with Release 1.3(1), run the shell script
$HOME/.cisco_mds9000/Uninstall.sh or /usr/local/.cisco_mds9000/uninstall.sh, depending on where
Fabric Manager was installed.
Step 3 For earlier installations, delete the $HOME/.cisco_mds9000 folder.
CH A P T E R 3
Fabric Manager Server
Fabric Manager Server is a platform for advanced MDS monitoring, troubleshooting, and configuration
capabilities. No additional software needs to be installed. The server capabilities are an integral part of
the Cisco Fabric Manager software.
This chapter contains the following sections:
Fabric Manager Server Overview, page 3-1
Fabric Manager Server Features, page 3-1
Installing and Configuring Fabric Manager Server, page 3-2
Managing a Fabric Manager Server Fabric, page 3-3
Fabric Manager Server Properties File, page 3-4
Modifying Fabric Manager Server, page 3-6
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You must have the same release of Fabric Manager Client and Fabric Manager Server.
To install Fabric Manager Server and set the initial configuration, follow these steps:
Step 1 Install Fabric Manager and Fabric Manager server on your workstation. See the Installing Fabric
Manager Server section on page 3-2.
Step 2 Log in to Fabric Manager. See the Launching Fabric Manager Client in Cisco SAN-OS Release 3.2(1)
and Later section on page 5-2.
Step 3 Set Fabric Manager Server to continuously monitor the fabric. See the Managing a Fabric Manager
Server Fabric section on page 3-3.
Step 4 Repeat Step 2 through Step 3 for each fabric that you want to manage through Fabric Manager Server.
Step 5 Install Fabric Manager Web Server. See the Verifying Performance Manager Collections section on
page 3-3.
Step 6 Verify Performance Manager is collecting data. See the Verifying Performance Manager Collections
section on page 3-3.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Starting from NX-OS Release 4.1(3a), when you install a licensed version of the Fabric manager Server,
it will automatically install Fabric Manager Client.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You can pre-configure a user name and password to manage fabrics. In this instance, you should
use a local switch account, not a TACACS+ server.
Note If you are collecting data on these fabrics using Performance Manager, you should now configure flows
and define the data collections. These procedures are described in Chapter 8, Performance Manager.
Note As of Cisco MDS NX-OS Release 4.1(3a), the Admin option is set to Manage Continuously by default
on all the switches that are once discovered.
Note As of Cisco NX-OS Release 4.1(1b) and later, you can optionally encrypt the password in the
server.properties and the AAA.properties files.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
SNMP Specific
snmp.preferTCPIf this option is set to true, TCP will be the default protocol for the Fabric
Manager Server to communicate with switches. By default, this setting is true. For those switches
that do not have have TCP enabled, the Fabric Manager Server uses UDP. The advantage of this
setting is the ability to designate one TCP session for each SNMP user on a switch. It also helps to
reduce timeouts and increase scalability.
Note If you set this option to false, the same choice must be set in Fabric Manager. The default value
of snmp.preferTCP for Fabric Manager is true.
Performance Chart
pmchart.currenttimeSpecifies the end time to generate a Performance Manager chart. This
should only be used for debugging purposes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Event Forwarding
server.forward.event.enableEnables or disables event forwarding.
server.forward.email.fromAddressSpecifies the 'From Email' list.
server.forward.email.mailCCSpecifies the 'CC Email' list.
server.forward.email.mailBCCSpecifies the 'BCC Email' list.
server.forward.email.smtphostSpecifies the SMTP host address for outbound e-mail.
Deactivation
deactivate.confirm=deactivateSpecific Request for User to type a String for deactivation.
For more information on setting the server properties, read the server.properties file or see the
Configuring Fabric Manager Server Preferences section on page 7-52.
Step 1 Click the Local FM Users tab in the Control Panel dialog box (see Figure 3-1). You see a list of Fabric
Manager users.
Step 2 Click New to add a user or click the user name and click Edit to change the password for an existing user.
You see the FM User dialog box as shown in Figure 3-2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Set the user name and password for the new user and then click Apply.
To remove a Fabric Manager Server user using Fabric Manager, follow these steps:
Step 1 Click the Local FM Users tab in the Control Panel dialog box (see Figure 3-1). You see a list of Fabric
Manager users.
Step 2 Click the user name you want to delete.
Step 3 Click Remove to delete the user.
Step 4 Click Yes to confirm the deletion or No to cancel it.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To change the polling period or full fabric rediscovery setting used by Fabric Manager Server using
Fabric Manager, follow these steps:
CH A P T E R 4
Authentication in Fabric Manager
Fabric Manager contains interdependent software components that communicate with the switches in
your fabric. These components use varying methods to authenticate to other components and switches.
This chapter describes these authentication steps and the best practices for setting up your fabric and
components for authentication.
This chapter contains the following sections:
Fabric Manager Authentication Overview, page 4-1
Best Practices for Discovering a Fabric, page 4-3
Performance Manager Authentication, page 4-4
Fabric Manager Web Server Authentication, page 4-4
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
AAA server
Fabric Manager
Client
Fabric
130715
Local database
Administrators launch Fabric Manager Client and select the seed switch that is used to discover the
fabric. The user name and password used are passed to Fabric Manager Server and used to authenticate
to the seed switch. If this user name and password are not a recognized SNMP user name and password,
either Fabric Manager Client or Fabric Manager Server opens a CLI session to the switch (SSH or Telnet)
and retries the user name/password pair. If the user name and password are recognized by the switch in
either the local switch authentication database or through a remote AAA server, then the switch creates
a temporary SNMP user name that is used by Fabric Manager Client and server.
Note You may encounter a delay in authentication if you use a remote AAA server to authenticate Fabric
Manager or Device Manager.
Note You must allow CLI sessions to pass through any firewall that exists between Fabric Manager Client and
Fabric Manager Server. See the Running Fabric Manager Behind a Firewall section on page 2-40.
Note We recommend that you use the same password for the SNMPv3 user name authentication and privacy
passwords as well as the matching CLI user name and password.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution If the Fabric Manager Servers CPU usage exceeds 50 percent, it is recommended that you switch to a
higher CPU-class system. For more information on recommended hardware, see the Before You Install
section on page 2-18.
We recommend you use these best practices for discovering your network and setting up Performance
Manager. This ensures that Fabric Manager Server has a complete view of the fabric. Subsequent Fabric
Manager Client sessions can filter this complete view based on the privileges of the client logging in.
For example, if you have multiple VSANs in your fabric and you create users that are limited to a subset
of these VSANs, you want to initiate a fabric discovery through Fabric Manager Server using a network
administrator or network operator role so that Fabric Manager Server has a view of all the VSANs in the
fabric. When a VSAN-limited user launches Fabric Manager Client, that user sees only the VSANs they
are allowed to manage.
Note Fabric Manager Server should always monitor fabrics using a local switch account, do not use a AAA
(RADIUS or TACACS+) server. You can use a AAA user account to log into the clients to provision
fabric services. For more information on Fabric Manager Server fabric monitoring, see the Managing
a Fabric Manager Server Fabric section on page 3-3.
Step 1 Create a special Fabric Manager administrative user name in each switch on your fabric with network
administrator or network operator roles. Or, create a special Fabric Manager administrative user name
in your AAA server and set every switch in your fabric to use this AAA server for authentication.
Step 2 Verify that the roles used by this Fabric Manager administrative user name are the same on all switches
in the fabric and that this role has access to all VSANs.
Step 3 Launch Fabric Manager Client using the Fabric Manager administrative user. This ensures that your
fabric discovery includes all VSANs.
Step 4 Set Fabric Manager Server to continuously monitor the fabric.
See the Managing a Fabric Manager Server Fabric section on page 3-3.
Step 5 Repeat Step 4 for each fabric that you want to manage through Fabric Manager Server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the fabrics that have updated user name and password information.
Step 3 From the Admin listbox, select Unmanage and then click Apply.
Step 4 Enter the appropriate user name and password and then click Apply.
Step 5 From the Admin listbox, select Manage and then click Apply.
Step 6 To rediscover the fabric, click Open tab and check the check box(es) next to the fabric(s) you want to
open in the Select column.
Step 7 Click Open to rediscover the fabric. Fabric Manager Server updates its user name and password
information.
Step 8 Repeat Step 3 through Step 7 for any fabric that you need to rediscover.
Step 9 Choose Performance > Collector > Restart to restart Performance Manager and use the new user name
and password.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To configure Fabric Manager Web Server to use TACACS+ authentication, follow these steps:
Note Fabric Manager does not support SecureID because it is not compatible with SNMP authentication.
Fabric Manager uses the same login credentials for all the switches in a fabric. Since SecureID cannot
be used more than once for authentication, Fabric Manager will not be able to establish a connection to
the second switch using a SecureID.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 5
Fabric Manager Client
Cisco Fabric Manager Client is a java-based GUI application that provides access to the Fabric Manager
applications from a remote workstation.
This chapter contains the following sections:
About Fabric Manager Client, page 5-1
Launching Fabric Manager Client in Cisco SAN-OS Release 3.2(1) and Later, page 5-2
Fabric Manager Client Quick Tour: Server Admin Perspective, page 5-7
Fabric Manager Client Quick Tour: Admin Perspective, page 5-12
Setting Fabric Manager Preferences, page 5-30
Network Fabric Discovery, page 5-31
Modifying the Device Grouping, page 5-32
Controlling Administrator Access with Users and Roles, page 5-34
Using Fabric Manager Wizards, page 5-34
Fabric Manager Troubleshooting Tools, page 5-35
Note You must use the same release of Fabric Manager Client and Fabric Manager Server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Network administrators must initially launch Fabric Manager Client using Fabric Manager Web Server,
as described in the following procedure. Once an administrator has installed the Fabric Manager Client
icon on your desktop, you can double-click the icon to launch the Fabric Manager Client.
Step 1 Open your browser and enter the IP address where you installed Fabric Manager Server, or enter
localhost if you installed Fabric Manager Server on your local workstation.
You see the Fabric Manager Web Server Login dialog box shown in Figure 5-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Enter your user name and password and click Login.
You see the Fabric Manager Web Server Summary page.
Step 3 Click the Download link in the upper right corner of the page.
You see the Download page for Fabric Manager and Device Manager (see Figure 5-2).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 5-2 Download Page for Fabric Manager and Device Manager
Step 4 Click the link for either Fabric Manager or Device Manager.
If you are launching Fabric Manager Client for the first time, you see a message asking whether you want
to create shortcuts for Fabric Manager (see Figure 5-3).
Note This message only appears the first time you launch Fabric Manager Client. If you select No,
your selection will be remembered and you will not be prompted to make a selection again. In
this case, you will need to launch Fabric Manager Client using the Fabric Manager Web Client.
Step 6 When the software is installed and icons are created on your desktop, double-click the Fabric Manager
icon to launch Fabric Manager.
You see the Fabric Manager Login dialog box shown in Figure 5-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 Enter the Fabric Manager Server user name and password.
Step 8 Check the Use SNMP Proxy check box if you want Fabric Manager Client to communicate with Fabric
Manager Server through a TCP-based proxy server.
Step 9 Click Login. Once you successfully log in to Fabric Manager Server, you can set the seed switch and
open the fabrics that you are entitled to access.
Note When you launch Fabric Manager Client for the first time or when there are no available fabrics,
you see the Discover New Fabric dialog box.
You see the Discover New Fabric dialog box shown in Figure 5-5.
Step 10 Set the fabric seed switch to the Cisco MDS 9000 Family or Cisco Nexus 5000 Series switch that you
want Fabric Manager to use.
Note A Cisco Nexus 5000 Series switch will be discovered as part of the fabric only if the switch has
Fibre Channel over Ethernet (FCoE) features enabled.
Step 11 Enter the user name and password for the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 12 Choose the Auth-Privacy option according to the privacy protocol you have configured on your switch:
a. If you have not configured the switch with a privacy protocol, then choose Auth-Privacy option MD5
(no privacy).
b. If you have configured the switch with your privacy protocol, choose your Auth-Privacy choice.
Note If you want a clean discovery, remove the fabric and rediscover it.
Note You see a message in the dialog box when the server and client are running on the same
workstation and there are unlicensed fabrics in the database. You also see a message when there
are unmanaged fabrics (the state of the licenses is unknown).
Step 14 Check the check box(es) next to the fabric(s) you want to open in the Select column, or click Discover
to add a new fabric.
Note Only network administrators can continuously manage or unmanage fabrics. For more
information, see the Selecting a Fabric to Manage Continuously section on page 3-3.
Note If you have an incomplete view of your fabric, rediscover the fabric with a user that has no
VSAN restriction.
If the fabric includes a Cisco Nexus 5000 Series switch, then the FCoE node appears under
the Switches > Interfaces > Ethernet tree in the Physical Attributes pane.
To launch Fabric Manager Client from within a running instance of Fabric Manager, follow these steps:
Step 1 Choose File > Open Fabric or click the Open Switch Fabric icon on the Fabric Manager toolbar.
You see the Control Panel dialog box (see Figure 5-6).
Step 2 Check the check box(es) next to the fabric(s) you want to open in the Select column and click Open.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Changes made using Fabric Manager are applied to the running configuration of the switches
that you are managing. If you have made changes to the configuration or performed an operation
(such as activating zones), Fabric Manager prompts you to save your changes before you exit.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Menu Bar
The menu bar at the top of the Fabric Manager main window provides options for managing and for
controlling the display of information on the Fabric pane. Server admin will not have all the options that
are available for SAN admin. The menu bar provides the following menus:
FileOpens a new fabric, rediscovers the current fabric, locates switches, sets preferences, prints
the map.
ViewChanges the appearance of the map (these options are duplicated on the Fabric pane toolbar).
ToolsManages the Server and configuration using the FlexAttach virtual pWWN feature, as
described in the Using the Server Admin FlexAttach Wizards section on page 14-9.
HelpDisplays online help topics for specific dialog boxes in the Information pane.
Tool Bar
The Fabric Manager main toolbar (specific to server admin) provides icons for accessing the most
commonly used menu bar options as shown in Table 5-5.
Icon Description
Opens switch fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To select an option, click a folder to display the options available and then click the option. You see the
table with information for the selected option in the Information pane. The Physical Attributes pane
provides the following main folders:
SwitchesViews and configures hardware, system, licensing, and configuration files.
InterfacesViews and configures FC physical, FC logical, Ethernet, SVC, and PortChannel
interfaces.
Information Pane
Use the Information pane to display tables of information associated with the option selected from the
menu tree in the Logical Domains or Physical Attributes panes. The Information pane toolbar provides
buttons for performing one or more of the operations shown in Table 5-2.
Icons Description
Applies configuration changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Fabric Pane
Use the Fabric pane to display the graphical representation of your fabric. Table 5-1 explains the
graphics you may see displayed, depending on which devices you have in your fabric.
The bottom of the Fabric pane has the following tabs:
FabricWhen displaying multiple fabrics, each fabric has its own tab. You can switch between
fabrics by clicking on their respective tabs.
LogDisplays messages that describe Fabric Manager operations, such as fabric discovery.
EventsDisplays information about the SNMP traps received by the management station. This
includes combination events as detected by discovery and important traps such as license, SNMP,
and FICON.
Note Fabric map display is based on what you select in the logical domain pane. When you select a fabric
node, all the switches that belong to that fabric will be enabled. When you select the group node, all the
switches that belong to the groups listed under that group node will be enabled. When you select only a
group, all the switches that belong to the specific group will be enabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
6 Status Bar (left side)Shows short-term transient messages, such as the number of rows
displayed in a table.
7 Physical Attributes paneDisplays a tree of available configuration tasks depending on the
fabric, VSAN, or zone selected previously. Lists the switches and end devices in the logical
selection.
8 Logical Domains paneDisplays a tree of configured SAN, fabrics, VSANs, and zones, and
provides access to user-defined groups. The label next to the segmented VSAN indicates the
number of segments.
Note You can resize each pane by dragging the boundaries between each region or by clicking the Minimize
or Maximize controls.
Menu Bar
The menu bar at the top of the Fabric Manager main window provides options for managing and
troubleshooting the current fabric and for controlling the display of information on the Fabric pane. The
menu bar provides the following menus:
FileOpens a new fabric, rediscovers the current fabric, locates switches, sets preferences, prints
the map, and exports the Fabric pane log.
ViewChanges the appearance of the map (these options are duplicated on the Fabric pane toolbar).
ZoneManages zones, zone sets, and inter-VSAN routing (IVR).
ToolsVerifies and troubleshoots connectivity and configuration, as described in the Fabric
Manager Troubleshooting Tools section on page 5-35.
PerformanceRuns and configures Performance Manager and Cisco Traffic Analyzer, and
generates reports.
ServerRuns administrative tasks on clients and fabrics. Provides Fabric Manager Server
management and a purge command. Lists fabrics being managed.
HelpDisplays online help topics for specific dialog boxes in the Information pane.
File
The file menu provides the following options:
Open FabricOpens a new switch fabric.
Locate Switches and DevicesUses the SNMPv2 protocol to discover devices responding to SNMP
requests with the read-only community string public. You may use this feature if you want to locate
other Cisco MDS 9000 switches in the subnet, but are not physically connected to the fabric.
RediscoverInitiates an on-demand discovery to learn recent changes from the switches and update
the Fabric Manager Client. You may use this option when Fabric Manager Server is not in sync with
switches in the fabric and you do not want to wait until the next polling cycle. The rediscover option
does not delete the fabric and add it again. You may delete and add the fabric only if the rediscover
option fails to update Fabric Manager Server.
Resync All Open FabricsFabric Manager Server forces all the fabrics to close and re-open. You
may use this option when Fabric Manager Client is not in sync with Fabric Manager Server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Rediscover SCSI TargetsInitiates an on-demand discovery to learn recent changes from the SCSI
target switches. You may use this option when Fabric Manager Server is not in sync with SCSI target
switches in the fabric and you do not want to wait until the next polling cycle.
PreferencesSets your preferences to customize the behavior of the Fabric Manager Client.
Import EnclosuresImports saved enclosures.
Export
Map ImageGenerates and export the map to a specified location.
VisioExports the map to a Visio file.
TableExports the table data to a text file.
LogExports the log to a text file.
EventsExports the events to a text file.
EnclosuresExports the enclosure values to a text file.
Print Prints the map.
ExitExit Fabric Manager.
View
View menu provides the following options:
Refresh MapRefreshes the current map.
Layout
CancelCancels the current layout.
SpringDisplays the layout based on spring algorithm.
QuickQuickly displays the layout when the switch has many end-devices.
Zoom
InZooms in the view.
OutZooms out the view.
FitFits the view in the fabric pane.
GridEnables the grid view.
Overview WindowAllows you to center the Fabric pane on the area of the fabric that you want to
see. This option is useful for large fabrics that cannot be displayed entirely within the Fabric pane.
LegendShows all the legends used in the fabric map.
Find in MapFinds a device in the fabric map.
Zone
The zone menu provides the following options:
Edit Local Full Zone DatabaseAllows you to create zones across multiple switches. Zones
provide a mechanism for specifying access control. Zone sets are a group of zones to enforce access
control in the fabric. All zoning features are available through the Edit Local Full Zone Database
dialog box.
Deactivate ZonesetDeactivates an active zone-set.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Copy Full Zone DatabaseCreates a new zone set. On the Cisco MDS Family switches, you cannot
edit an active zone set. However, you can copy an active zone set to create a new zone set that you
can edit.
Merge AnalysisEnables you to determine if zones will merge successfully when two Cisco MDS
switches are interconnected. If the interconnected switch ports allow VSANs with identical names
or contain zones with identical names, then Fabric Manager verifies that the zones contain identical
members. You can use merge analysis tool before attempting a merge, or after fabrics are
interconnected to determine zone merge failure causes.
Migrate Non-MDS Database -Migrate a non-MDS database using Fabric Manager (you may need
to use the Zone Migration Wizard to accomplish this task).
IVR
Deactivate ZonesetDeactivates an active zone-set.
Copy Full Zone DatabaseRecovers an IVR zone database by copying the IVR full zone
database from another switch.
Copy Full TopologyRecovers a topology by copying from the active zone database or the full
zone database.
Tools
Tools menu provides the following options:
Health
Switch HealthDetermines the status of the components of a specific switch.
Fabric ConfigurationAnalyzes the configuration of a switch by comparing the current
configuration to a specific switch or to a policy file. You can save a switch configuration to a
file and then compare all switches against the configuration in the file.
Show Tech SupportCollects large amount of information about your switch for
troubleshooting purposes. When you issue a show tech support command from Fabric Manager
for one or more switches in a fabric, the results of each command are written to a text file, one
file per switch, in a directory you specify. You can then view these files using Fabric Manager.
Connectivity
End to End ConnectivityDetermines connectivity and routes among devices with the switch
fabric. This tool checks to see that every pair of end devices can talk to each other, using a Ping
test and by determining if they are in the same VSAN or in the same active zone.
PingDetermines connectivity from another switch to a port on your switch.
Trace RouteVerifies connectivity between two end devices that are currently selected on the
Fabric pane.
NPV
CFS Static Peer SetupManage the peer list used during CFS on NPV enabled switches. After
setting up the static peers list, the CFS discovery on the switches will be changed to static mode
for all peers in the list. Fabric Manager does not automatically update static peers list. You may
need to update the list using the CFS Static Peer Setup Wizard when a new switch is added to
the fabric.
Traffic Map SetupConfigures the list of external interfaces to the servers, and enabling or
disabling disruptive load balancing. Using Traffic Map Setup you can specify the external ports
that a server should use for traffic management.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Flex Attach Pre-Configure ServerSets the port configurations for all the ports in a switch such
as enabling or disabling FlexAttach, setting the default VSAN ID, setting the interface status
etc.
Flex Attach Move ServerMoves a server to another port on the same NPV device or another
NPV device without changing the SAN.
Flex Attach Replace ServerReplaces a failed server with a new server on the same port
without changing the SAN.
Data Mobility Manager
Server BasedPerforms server-based data migration.
Storage basedPerforms storage-based data migration.
Server LUN DiscoveryPerforms LUN discovery to select the LUNs available for migration
and automates the session creation by matching the LUNs in the existing and new storage.
Port ChannelCreates PortChannels from selected ISL either manually or automatically.
DPVM SetupEstablishes dynamic port VSAN membership, enables autolearning, and activates
the DPVM database.
IP SAN
FCIP TunnelCreates FCIP links between Gigabit Ethernet ports. Enables Fibre Channel write
acceleration and IP compression
iSCSI SetupCreates zones for iSCSI initiators and adds a VSAN to a target-allowed VSAN
list.
SAN Extension TunerOptimizes FCIP performance by generating either direct access
(magnetic disk) or sequential access (magnetic tape) SCSI I/O commands and directing such
traffic to a specific virtual target. This option is used to generate SCSI I/O commands (read and
write) to the virtual target based on your configured options.
Security
Port SecurityPrevents unauthorized access to a switch port in the Cisco MDS 9000 Family,
rejects intrusion attempts and reports these intrusions to the administrator.
IP ACLCreates an ordered list of IP filters in a named IPv4-ACL or IPv6-ACL profile using
the IPv4-ACL Wizard.
Install
LicenseFacilitate download and installation of licenses in selected switches in the fabric.
SoftwareVerifies image compatibility and installs software images on selected switches in the
fabric.
Flow Load Balance CalculatorAllows you to get the best load balancing configuration for your
FICON flows. The calculator does not rely on any switch or flow discovery in the fabric.
Virtual InterfaceInvokes the Virtual Interface Wizard.
Note The Virtual Interface menu option appears only if the discovered fabric has a Cisco Nexus
5000 Series switch with the FCoE feature enabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Performance
The performance menu provides the following options:
Create FlowsCreates host-to-storage, storage-to-host, or bidirectional flows. You can add these
flows to a collection configuration file to monitor the traffic between a host or storage element pair.
Server
The server menu provides the following options:
AdminOpens the control panel.
Purge Down ElementsPurges all down elements in the fabric.
Help
The help menu provides the following options:
ContentsLaunches the online help contents.
Config GuideLaunches the Fabric Manager Configuration Guide.
AboutDisplays information about Fabric Manager.
Toolbar
The Fabric Manager main toolbar provides icons for accessing the most commonly used menu bar
options as shown in Table 5-3.
Icon Description
Opens switch fabric.
Creates VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Icon Description
Edits full zone database.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Icon Description
Performs fabric configuration analysis.
Filtering
Fabric Manager has a filtering mechanism that displays only the data that you are interested in. To filter,
first select the fabric and VSAN from the Logical Domains pane. This action narrows the scope of what
is displayed in the Fabric pane. Any information that does not belong to the selected items is dimmed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Also, any information that does not belong to the selected items is not displayed in the tables in the
Information pane. As shown in Figure 5-9, the filter that you select is displayed at the top right of the
Fabric Manager window.
To further narrow the scope, select attributes from the Physical Attributes pane. The Fabric Manager
table, display, and filter criteria change accordingly.
Switch Options
To view the options for the switch table, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
ISL Options
To view the options for the ISLs table, follow these steps:
Step 1 In the Physical Attributes pane, click ISLs and then click Summary tab.
Step 2 Right-click the device in the table.
The pop-up menu provides the following options:
Refresh ValuesRefreshes the current values.
CopyCopies information from a specific field.
FindConducts search based on the input string.
Export to FileExports the values to a file.
Print TablePrints the table.
Detach TableDetaches the table.
Interface AttributesChanges the interface properties.
Element ManagerManages the device.
FCIP Tunnel AttributesChanges FCIP tunneling properties.
Create Port ChannelCreates port channel.
Re-enableReenables a disabled device.
Enable FC-SPEnables FC-SP.
SAN Extention TunerOptimizes FCIP performance.
PurgePurges the device.
Note When you select a port channel from the table, the pop-up menu will have the following additional
options:
Member AttributesChanges the member properties.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To view the options for the end devices table, follow these steps:
Step 1 In the Physical Attributes pane, click End Devices and then click the Summary tab.
Step 2 Right-click the device in the table.
The pop-up menu provides the following options:
Apply ChangesApplies the changes to the device.
Refresh ValuesRefreshes the current values.
CopyCopies the information specific to the field.
PastePastes the copied text.
Undo ChangesUndoes modifications to the device.
FindSearches for information depending on the input string.
Export to FileExports the values to a file.
Print TablePrints the table.
Detach TableDetaches the table.
Device AttributesChanges the device properties.
Interface AttributesChanges the interface properties.
Element ManagerManages this device.
Command Line InterfaceEnables you to perform command line operations.
CopyCopies the switch.
PurgePurges the switch.
Fix LocationFixes the switch in the current location.
AlignAligns the switch.
PingPings another device.
Trace RouteDetermines the route taken by packets across the network.
Select Dependent PortsSelects dependent ports.
GroupGroups devices.
Information Pane
Use the Information pane to display tables of information associated with the option selected from the
menu tree in the Logical Domains or Physical Attributes panes. The Information pane toolbar provides
buttons for performing one or more of the operations shown in Table 5-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Icon Description
Applies configuration changes.
Note After making changes, you must save the configuration or the changes will be lost when the device is
restarted.
Note The buttons that appear on the toolbar vary according to the option that you select. They are activated or
deactivated (dimmed) according to the field or other object that you select in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Detachable Tables
Detachable tables in Fabric Manager allow you to detach tables and move them to different areas on your
desktop so that you can compare similar tables from different VSANs. You can keep informational tables
open from one view while you examine a different area in Fabric Manager. To detach tables, click the
Detach Table icon in the Information pane in Fabric Manager.
Fabric Pane
Use the Fabric pane to display the graphical representation of your fabric. Table 5-5 explains the
graphics you may see displayed, depending on which devices you have in your fabric.
Cisco SN5428.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IP PortChannel.
DWDM connection.
NPV connection.
If a switch or director is grayed out, Fabric Manager can no longer communicate with it.
The bottom of the Fabric pane has the following tabs:
FabricWhen displaying multiple fabrics, each fabric has its own tab. You can switch between
fabrics by clicking on their respective tabs.
LogDisplays messages that describe Fabric Manager operations, such as fabric discovery.
EventsDisplays information about the SNMP traps received by the management station. This
includes combination events as detected by discovery and important traps such as license, SNMP,
and FICON.
When viewing large fabrics in the Fabric pane, it is helpful to do the following tasks:
Turn off end device labels.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Collapse loops.
Collapse expanded multiple links (collapsed multiple links are shown as very thick single lines).
Dim or hide portions of your fabric by VSAN.
Note When a VSAN, zone, or zone member is selected in the VSAN tree, the map highlighting changes to
identify the selected objects. To remove this highlighting, click the Clear Highlight button on the Fabric
pane toolbar or choose Clear Highlight from the pop-up menu.
Context Menus
When you right-click an icon in the Fabric pane, you see a pop-up menu with options that vary depending
on the type of icon selected. The various options available for different objects include the following:
Open an instance of Device Manager for the selected switch.
Open a CLI session for the selected switch.
Copy the display name of the selected object.
Execute a ping or traceroute command for the device.
Show or hide end devices.
View attributes.
Quiesce and disable members for PortChannels.
Set the trunking mode for an ISL.
Create or add to a PortChannel for selected ISLs.
The Fabric pane has its own toolbar with options for saving, printing, and changing the appearance of
the map. When you right-click the map, a pop-up menu appears that provides options (duplicated on the
toolbar) for changing the appearance of the map.
Note You can launch web-based or non-web-based applications from the Fabric pane. To do this, you assign
an IP address to the storage port or enclosure. Then right-click to bring up the pop-up menu, and select
Device Manager.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you select an element that is not down and purge it, that element will reappear on the next
fabric discovery cycle.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
1 The Fabric view tab for fabric 172.23.46.152. When selected, the Fabric view displays fabric
172.23.46.152.
2 The Fabric view tab for fabric 172.23.46.153. When selected, the Fabric view displays fabric
172.23.46.153.
3 SAN tab (selected), showing two fabrics.
The information for both fabrics is displayed; you do not need to select a seed switch. To see details of
a fabric, select the tab for that fabric at the bottom of the Fabric pane, or double-click the Cloud icon for
the fabric in the SAN tab.
Note Enclosure names should be unique. If the same enclosure name is used for each port, Fabric Manager
shows a host/target enclosure connected to both fabrics. To fix this problem, you can either disable
auto-creation or create unique enclosure names.
Filtering by Groups
You can filter the Fabric pane display by creating groups of switches or end ports. To create a group in
Fabric Manager, follow these steps:
Step 1 Right-click a switch or end port in the Fabric pane map and select Group > Create.
You see the Edit User Defined Group dialog box shown in Figure 5-10.
To add a switch or end port to an existing group in Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Right-click a switch or end device and select Group > Add To > YourGroupName.
You see the Edit User Defined Group dialog box (see Figure 5-10).
Step 2 Use the arrows to move additional switches or end ports from the Available column to the Selected
column.
Step 3 Click OK to save the updated group.
To filter the display by a group you have created, follow these steps:
Step 2 Click the name of the group that you want to filter.
In the Fabric pane, the switches or end devices in your group are shown normally; all other switches and
end devices are shown in gray.
Step 3 Click the Groups folder in the Logical Domains pane to return the display to normal.
Note User-defined groups tables are filtered based on switches in the group except for switches where
CFS-controlled features are enabled when all CFS member switches are displayed to avoid
misconfigurations.
Status Bar
The status bar at the bottom of the Fabric Manager window shows the last entry displayed by the
discovery process, and the possible error message on the right side. The status bar displays a message
stating that something has changed in the fabric and a new discovery is needed. The status bar shows
both short-term, transient messages (such as the number of rows displayed in the table) and long-term
discovery issues.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you browse for a path or enter a path and you have a space in the pathname (for example,
c:\program files\telnet.exe), then the path will not work. To get the path to work, you must
manually place quotes around it (for example, "c:\program files\telnet.exe").
Use Secure Shell instead of TelnetSpecifies whether to use SSH or Telnet when using the CLI to
communicate with the switch. If enabled, you must specify the path to your SSH application. The
default setting is disabled.
Confirm DeletionDisplays a confirmation pop-up window when you delete part of your
configuration using Fabric Manager. The default setting is enabled (checked).
Export Tables with FormatSpecifies the type of file that is created when you export a table using
Device Manager. The options are tab-delimited or XML. The default setting is Tab-Delimited.
Show CFS WarningsShows warning messages if CFS is not enabled on all switches for a selected
feature.
The default SNMP preferences for Fabric Manager are as follows:
Retry request 1 time(s) after 5 sec timeoutYou can set the retry value to 0-5, and the timeout value
to 3-30.
Trace SNMP packets in LogThe default setting for this value is ON.
Enable Audible Alert when Event ReceivedThe default setting for this value is OFF.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand End Devices and then select Storage or Hosts in the Physical Attributes pane.
You see the end devices displayed in the Information pane.
Step 2 Click one of the devices in the Fabric pane, or click the Enclosures tab of the Information pane, and then
click the device name (in the Name field) that you want to include in the enclosure.
Step 3 Enter a name to identify the new enclosure in the Fabric pane map.
Step 4 Click once on the device name in the Name field. To select more than one name, press the Shift key and
click each of the other names.
Step 5 Press Ctrl-C to copy the selected name(s).
Step 6 Press Ctrl-V to paste the device name into the Name field.
Note To remove devices from an enclosure, triple click the device name and press Delete. To remove
an enclosure, repeat this step for each device in the enclosure.
Step 1 Expand End Devices and select Hosts or Storage from the Physical Attributes pane.
You see the list of devices in the Information pane. The NxPorts tab is the default.
Step 2 Right-click the enclosure names that you want to convert to alias names and select Alias > Enclosure as
shown in Figure 5-12.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The Ailas > Enclosures window appears as shown in Figure 5-13. It contains a list of expressions. You
can also add expressions to the list and modify expressions in the current list.
Step 3 Click the Apply Changes icon to save the changes and then click Close.
Note Fabric Manager uses the regular expressions to convert multiple alias names into one enclosure. The
alias names should be in the same expression pattern rule. You can create enclosure names from selected
aliases using the regular expresssions list.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 6
Device Manager
Device Manager provides a graphic representation of a Cisco MDS 9000 Family switch chassis or Cisco
Nexus 5000 Series switch chassis, including the installed switching modules, the supervisor modules,
the status of each port within each module, the power supplies, and the fan assemblies.
This chapter includes the following sections:
About Device Manager, page 6-1
Launching Device Manager, page 6-2
Using Device Manager, page 6-2
Setting Device Manager Preferences, page 6-8
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
1 2 3
272424
5 4
Menu Bar
The menu bar at the top of the Device Manager main window provides options for managing and
troubleshooting a single switch. The menu bar provides the following options:
DeviceOpens an instance of Device Manager, sets management preferences, sets the page layout,
opens a Telnet/SSH session with the current switch, exports a device image, and closes the Device
Manager application.
PhysicalAllows you to view and manage inventory, modules, temperature sensors, power
supplies, fans, and the entire system.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
InterfaceAllows you to configure and manage PortChannels, as well as Fibre Channel, Ethernet,
iSCSI, and FICON ports. Also provides diagnostic, management and monitoring capabilities, as
well as SPAN and port tracking.
FCAllows you to configure and manage VSAN, domain, and name server characteristics. Also
provides advanced configuration capabilities.
FICONAllows you to configure and manage FICON VSANs, configure RLIR ERL information,
swap selected FICON ports, and view FICON port numbers.
IPAllows you to configure and manage the following types of information: FCIP, iSCSI, iSNS,
routes, VRRP, and CDP.
SecurityAllows you to configure and manage FCSP, port security, iSCSI security, SNMP security,
common roles, SSH, AAA, and IP ACLs.
AdminAllows you to save, copy, edit, and erase the switch configuration, monitor events,
manipulate Flash files, manage licenses, configure NTP, use CFS, and reset the switch. Also enables
you to use the show tech support, show cores, and show image commands.
LogsShows the various logs: message, hardware, events, and accounting. Also displays FICON
link incidents, and allows you to configure the syslog setup.
HelpDisplays online help topics for specific dialog boxes in the Information pane.
Toolbar Icons
The Device Manager toolbar provides quick access to many Device Manager features. Once the icon is
selected, a dialog box may open that allows configuration of the feature. The toolbar provides the main
Device and Summary View icons as shown in Table 6-1.
Icon Description
Open Device Opens the Device Manager view for another
switch, with the option to open this view in a
separate window.
Refresh Display Communicates with the switch and displays the
information in the Device Manager view.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Icon Description
Save Configuration Saves the current running configuration to the
startup configuration.
Dialog Boxes
If a toolbar icon is selected, a dialog box may open that allows configuration of the selected feature. The
dialog box may include table manipulation icons. See the Information Pane section on page 5-17 for
descriptions of these icons.
Tabs
Click the Device tab on the Device Manager main window to see a graphical representation of the switch
chassis and components.
Click the Summary tab on the Device Manager main window to see a summary of active interfaces on
a single switch, as well as Fibre Channel and IP neighbor devices. The Summary View also displays port
speed, link utilization, and other traffic statistics. There are two buttons in the upper left corner of the
Summary View tab used to monitor traffic. To monitor traffic for selected objects, click the Monitor
Selected Interface Traffic Util% button. To display detailed statistics for selected objects, click the
Monitor Selected Interface Traffic Details button. You can set the poll interval, the type or Rx/Tx
display, and the thresholds.
Legend
The legend at the bottom right of the Device Manager indicates port status, as follows:
Colors
GreenThe port is up.
BrownThe port is administratively down.
RedThe port is down or has failed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip You can select multiple ports in Device Manager and apply options to all the selected ports at one time.
Either select the ports by clicking the mouse and dragging it around them, or hold down the Control key
and click each port.
To enable or disable a port, right-click the port and click Enable or Disable from the pop-up menu. To
enable or disable multiple ports, drag the mouse to select the ports and then right-click the selected ports.
Then click Enable or Disable from the pop-up menu.
To manage trunking on one or more ports, right-click the ports and click Configure. In the dialog box
that appears, right-click the current value in the Trunk column and click nonTrunk, trunk, or auto from
the pull-down list.
To create PortChannels using Device Manager, click PortChannels from the Interface menu. For
detailed instructions, see Chapter 23, Configuring PortChannels. You can also use Fabric Manager to
conveniently create a PortChannel.
Note To create a PortChannel, all the ports on both ends of the link must have the same port speed, trunking
type, and administrative state.
Context Menus
Context menus are available in both Device Manager views by right-clicking a device or table.
From Device View:
DeviceRight-click a system, module, or power supply to bring up a menu that gives you the option
to configure or reset the device.
Port Right-click a port to bring up a menu that shows you the number of the port you have clicked,
and to give you the option to configure, monitor, enable, disable, set beacon mode, or perform
diagnostics on the port.
From Summary View:
Table Right-click the table header to show a list of which columns to display in that table:
Interface, Description, VSANs, Mode, Connected To, Speed (Gb), Rx, Tx, Errors, Discards, and
Log. Click the Description field to bring up the appropriate configuration dialog box for the port
type.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you browse for a path or enter a path and you have a space in the pathname (for example,
c:\program files\telnet.exe, then the path will not work. To get the path to work, manually
place quotes around it (for example, "c:\program files\telnet.exe").
Use Secure Shell Instead of TelnetSpecifies whether to use SSH or Telnet when using the CLI
to communicate with the switch. If enabled, you must specify the path to your SSH application. The
default setting is disabled.
CLI Session Timeout x secs (0= disable)Specifies the timeout interval for a CLI session. Enter
0 to disable (no timeout value). The default setting is 30 seconds.
Show Tooltips in Physical ViewDetermines whether tooltips are displayed in Physical (Device)
View. The default setting is enabled (checked).
Label Physical View Ports With:Specifies the type of label to assign to the ports when you are
in Physical (Device) View. The options are FICON and Interface. The default setting is Interface.
Export TableSpecifies the type of file that is created when you export a table using Device
Manager. The options are Tab-Delimited or XML. The default setting is Tab-Delimited.
CH A P T E R 7
Fabric Manager Web Client
With Fabric Manager Web Client, you can monitor Cisco MDS switch events, performance, and
inventory from a remote location using a web browser. You can also monitor the events, performance,
and inventory information of Cisco Nexus 5000 Series switches.
This chapter contains the following sections:
About Fabric Manager Web Client, page 7-1
Navigating Fabric Manager Web Client, page 7-2
Installing Fabric Manager Web Client, page 7-3
Launching Fabric Manager Web Client, page 7-7
Health, page 7-9
Performance, page 7-13
Inventory, page 7-29
Reports, page 7-38
Admin, page 7-45
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Navigation Tree
You can use the filter navigation tree in the left pane to access the areas you want as follows:
Select SAN to view information for all fabrics and VSANs in the SAN. When you do this, a Fabric
column is added as the first column of the tables.
Click a fabric folder to view information for that specific fabric.
Some screens have expandable fabric folders. You can expand the fabric folders (by clicking the +
or - icons in front of the folders) to see a list of VSANs in that fabric. Select a VSAN to view
information for that VSAN.
The features accessible from the tabs are limited to the areas you select in the filter tree.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You can filter the display of some tables to view subsets of the information. At the top right of these
tables are one or more drop-down lists. Select an item from these lists, and then click Filter to filter the
table information on that item.
You can change the number of rows displayed per page by selecting a number from the Rows per page
drop-down list at the lower left corner of the table. Once you select a number, the table is updated with
the new number of rows; you do not have to click a button.
For tables with multiple pages of information, you can:
Jump to the first or last page of the table by clicking the first page or last page icons (arrows with a
bar in front of it)
Jump to the next page or previous page by clicking the next page or previous page icons (arrows)
Jump to a specific page by entering the page number in the Go to page field and clicking the Go
button.
You can search certain columns in the tables for information if a table column has a black icon next to
the column head. Click the icon to display a Search dialog box.
Printing
There is a Print icon in the lower right corner of some tables. Click this icon to view the table in a
printer-friendly format. You can then print the page from the browser.
Exporting to a File
There is an Export icon in the lower right corner of some tables. Click this icon to export the data to a
.CSV file that can be read by programs such as Microsoft Excel.
Sorting Columns
On some screens, you can click a column head to sort the information for that column.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Optionally, enter the IP address or host name of the supervisor module running Cisco MDS NX-OS in
the Location or Address field of your browser. You see the installation page displayed by the HTTP
server of the supervisor module.
When you connect to the server for the first time, it checks to see if you have the correct Sun Java Virtual
Machine version installed on your workstation. If you do not have the correct version installed, a link is
provided to the appropriate web page on the Sun Microsystems website so you can install it.
a. Click the Sun Java Virtual Machine software link (if required) to install the software.
b. Using the instructions provided by the Sun Microsystems website, reconnect to the supervisor
module by reentering the IP address or host name in the Location or Address field of your browser.
Note We recommend Java version 1.5(x) or later. To use IPv6 addresses, you must have Java version
1.5. To change the Java Runtime Environment (JRE) version, start Java Web Start and set the
Java preferences.
Step 2 Click the Fabric Manager Web Client installation link. You see a prompt asking for permission to
install the application on your workstation.
Step 3 Click Yes to run the installer, which detects the installed version of the software, and prompts for
upgrades or downgrades and other options if applicable.
Note If TCP port 80 is in use, Fabric Manager Web Client checks port 8080 next. If that port is also
in use, Fabric Manager Web Client uses the next available port. You can set the TCP port that
you want Fabric Manager Web Client to use during the installation process.
Unless you specify a different directory on a Windows PC, the software is installed in the default location
of C:\Program Files\Cisco Systems\MDS 9000. A Cisco MDS 9000 program group is created under
Start > Programs. This program group contains shortcuts to Fabric Manager and Device manager.
On a UNIX (Solaris or Linux) machine, the installation path is /usr/local/cisco_mds9000. If this directory
is not writable by the user, which is the case for non-root users, the default is set to $HOME/cisco_mds9000.
Shell scripts are created in the bin directory.
Note On a Windows PC, you install Fabric Manager Web Client as a service. This service can then be
administered using the Services Panel from the Windows Control Panel. By default, Fabric Manager
Web Client automatically starts when the workstation is rebooted. You can change this behavior by
modifying the properties in the Services Panel.
Note You need to configure the Fabric Manager Server on the DNS server for remote logins unless the Fabric
Manager Server is binding to a specific interface.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Set up a keystore to use self-signed certificate (local certificate). From the command line, enter the
following command:
%JAVA_HOME%/bin/keytool -genkey -alias tomcat -keyalg RSA -keystore "C:\Program
Files\Cisco Systems\MDS 9000\keystore"
Step 2 Enter your name, organization, state, and country. Enter changeit when prompted for a keystore
password. If you prefer to use your own password, do not forget to change the keystorepass attribute in
the server.xml file. When prompted for a key password, press Enter or use the same password as the
keystore password.
Note You can now follow the steps in the next section for modifying Fabric Manager Web Client to
use SSL.
In order to obtain a certificate from the Certificate Authority of your choice, you must create a Certificate
Signing Request (CSR). The CSR is used by the certificate authority to create a certificate that identifies
your website as secure.
To create a CSR, follow these steps:
Note You must enter the domain of your website in the field first and last name in order to create a
working certificate.
Now you have a file called certreq.csr. The file is encoded in PEM format. You can submit it to the
certificate authority. You can find instructions for submitting the file on the Certificate Authority
website. You will receive a certificate.
Step 3 Once you have your certificate, you can import it into your local keystore. You must first import a Chain
Certificate or Root Certificate into your keystore. You can then import your certificate.
Step 4 Download a Chain Certificate from the Certificate Authority where you obtained the certificate:
For Verisign.com commercial certificates, go to:
http://www.verisign.com/support/install/intermediate.html
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Import the Chain Certificate into your keystore by entering the following command:
keytool -import -alias root -keystore "C:\Program Files\Cisco Systems\MDS 9000\keystore"
-trustcacerts -file filename_of_the_chain_certificate
To modify Fabric Manager Web Client to use SSL, follow these steps:
Step 1 Stop Fabric Manager Web Client if you have already launched it. If you installed this on Windows, you
can stop the service using Windows Services under Administrative Tools.
Step 2 Use a text editor to open \jboss\server\default\deploy\jboss-web.deployer\server.xml from the
directory where Fabric Manager Web Client is installed. You see the following lines in the beginning
after some copyright information:
<Connector acceptCount="100" allowTrace="false" connectionTimeout="20000"
disableUploadTimeout="true" emptySessionPath="true" enableLookups="false"
maxHttpHeaderSize="8192" maxThreads="250" port="80" protocol="HTTP/1.1"
redirectPort="8443" strategy="ms"/>
<!-- Add this option to the connector to avoid problems with
.NET clients that don't implement HTTP/1.1 correctly
restrictedUserAgents="^.*MS Web Services Client Protocol 1.1.4322.*$"
-->
<!-- A AJP 1.3 Connector on port 8009 -->
<Connector emptySessionPath="true" enableLookups="false" port="8009"
protocol="AJP/1.3" redirectPort="8443"/>
<!-- SSL/TLS Connector configuration using the admin devl guide keystore
<Connector port="80"
protocol="HTTP/1.1" SSLEnabled="true"
maxThreads="100" strategy="ms" maxHttpHeaderSize="8192"
emptySessionPath="true"
scheme="https" secure="true" clientAuth="false" sslProtocol = "TLS"
securityDomain="java:/jaas/encrypt-keystore-password"
SSLImplementation="org.jboss.net.ssl.JBossImplementation" allowTrace="false"/>
-->
Step 3 Comment the first <Connector> element and uncomment the second one. Your file should look like the
following example:
<!-- A HTTP/1.1 Connector on port 8080 -->
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you restart Fabric Manager Server with SSL enabled, you must restart Fabric Manager Web Client. If
you want to stop and restart Fabric Manager Server with SSL disabled, then you must restart Fabric
Manager Web Client.
Step 1 If you are on the same workstation where you installed Fabric Manager Web Client, then open your
browser and in the Location field enter http://localhost:PORT. Enter your port number if you specified
a different port during installation. You can omit the port number if you used port 80 by default.
If you are on a different workstation from where you installed Fabric Manager Web Client, then open
your browser and in the Location field enter http://<yourServerAddress>:PORT, where
<yourServerAddress> is the address where you installed Fabric Manager Web Client, and PORT is 80
by default. Enter your port number if you specified a different port during installation.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip Choose Start > Control Panel > Administrative Tools > Services to verify that Fabric Manager
Web Client has started. To start Fabric Manager Web Client, use a browser to go to the location
of the service.
You can also view this information using the Admin > Status menu of the Fabric Manager Web
Client.
You see the Fabric Manager Web Client Login dialog box shown in Figure 7-2. The text field at the
bottom shows the Message of the Day from the server you logged into.
Note If you have a new installation of Fabric Manager, the default user ID and password is
admin/password. We recommend you change your password the first time you use Fabric
Manager Server. If you do not have a new installation, you can use any existing passwords.
Note If you are using Firefox to access Fabric Manager Web Client, you may receive a warning message
indicating a problem with the security certificate of the website. To resolve this issue, you may need to
add the security exception.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
After launching Fabric Manager Web Client, you see the screen as shown in Figure 7-1, which you can
also see by choosing Health > Summary. Fabric Manager Web Client polls the Fabric Manager Server
database to display the managed devices in the left pane.
Health
The Health tab shows events and issues for the selected items, persistent across user sessions.
The Health tab contains the following subtabs:
SummaryShows a summary of events and problems for all SANs, or a selected SAN, fabric, or
switch. You can click any of the blue links for more information about that item.
FabricShows a detailed list of events and hardware, or accounting. You can filter these events by
severity, date, and type of event.
SyslogShows a detailed list of system messages. You can filter these events by severity, date, and
type of event.
AnalysisEnables you to schedule or run analysis reports and compile results to analyze the Fabric
Manager Server database statistics.
Step 1 Click the Health tab, and then click Summary tab.
You see the Summary tab window. In the left navigation pane you see a list of the fabrics managed by
Fabric Manager Server. In the right pane is a summary table of problems and events for the last 24 hours
(see Figure 7-3).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Click the Health tab, and then click Fabric Events tab.
You see the Fabric tab window as shown in Figure 7-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and choose one of the switches to display event information for that switch.
Step 1 Click the Health tab, and then click Syslog tab.
You see the Syslog tab as shown in Figure 7-5.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select one of the fabrics to display a table of syslog information for that fabric.
Step 3 Expand a fabric and select one of the switches to display syslog information for that switch.
Step 4 If you have selected a fabric and one or more switches in that fabric have system messages, you see
Events, Hardware, Accounting, and Link Incidents in the Files column. Click one of these message
types to see system messages for the switches in that fabric filtered by the message type you clicked.
Note If you select a switch, choose an interval and a message type from the drop-down lists, and then
click Filter to see system messages filtered by the message type you chose.
Note To view MDS configuration changes, click accountingX.log under Files. To view the
configuration changes of a switch using Device Manager, click Logs > FMServer > Accounting
> Current.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Zoning DiscrepanciesThe zoning discrepancies report identifies zoning issues that might impact
connectivity or security.
Multi PathThe multi path report determines the number of active and inactive paths between
hosts and storage enclosures.
Switch HealthThe switch health report provides status information on all critical Cisco MDS
9000 system, module, port, and Fibre Channel services.
Fabric ConfigurationThe fabric configuration analysis compares multiple switches to a specific
switch or a saved configuration.
To run analysis reports using Fabric Manager Web Client, follow these steps:
Step 1 Click the Health tab, and then click Analysis tab.
You see the Analysis tab shown in Figure 7-6.
Performance
The Performance tab shows an overview of the average throughput and link utilization of SAN
components. You see pie charts for the throughput and utilization. You can click a pie chart to view a
table of the data. In these tables, clicking a blue link displays a graph of that data, if applicable. The
Filter drop-down list at the top right of the screen allows you to filter the data based on various periods
of time.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Click the Performance tab, and then click Summary tab.
You see the Summary tab shown in Figure 7-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and select one of the VSANs to display network throughput and link utilization
information for that VSAN.
Note Click a pie chart (Hosts, Storage, or ISLs) to go to the appropriate performance table.
Note License compliance information is provided at the top of the pane indicating that unlicensed switches
may not be supported in the future. You can click the link to view the list of unlicensed switches.
Note To view performance information, you must activate performance collector. To configure Performance
Manager, follow the instructions described in the Creating Performance Collections section on
page 7-57
Step 1 Click the Performance tab, and then click Summary tab.
Step 2 Click the Performance Utilization Summary Details link at the bottom of the page.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You will see the summary report details as shown in Figure 7-8.
Step 1 Click the Performance tab, and then click End Devices tab.
You see the End Devices tab window as shown in Figure 7-9.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and select one of the VSANs to display performance information for the end devices in
that VSAN.
Step 3 Click the name of a device in the Name column to see a graph of the traffic on that device for the past
24 hours.
Note There are variations to this procedure. In addition to these basic steps, you can also perform the
following steps to view detailed information for the end devices:
To change the time range for this graph, select it from the drop-down list in the upper right corner.
To view the detailed information for specific period, drag the slider control to choose the time
interval for which you need the information.
To view information in grid format, click the grid icon in the bottom right corner.
To export the data into a spreadsheet, click the excel icon in the upper right corner and then click
Save.
To view real time information, select Real Time from the drop-down list in the upper right corner.
Real time data is updated in every 10 seconds.
Step 1 Click the Performance tab, and then click ISLs tab.
You see the ISLs tab window as shown in Figure 7-10.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and select one of the VSANs to display performance information for the ISLs in that
VSAN.
Step 3 Click the name of an ISL from the Name column to see a graph of the traffic across that ISL for the past
24 hours.
You see the ISL traffic information window as shown in Figure 7-11.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Notation NaN (Not a Number) in the data grid means it is a negative value.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note There are variations to this procedure. In addition to the basic steps described above, you can also
perform the following steps to view detailed information for ISLs:
To change the time range for this graph, select it from the drop-down list in the upper right corner.
To view the detailed information for specific period, drag the slider control to choose the time
interval for which you need the information.
To view information in grid format, click the grid icon in the bottom right corner.
To export the data into a spreadsheet, click the excel icon in the upper right corner and then click
Save.
To view real time information, select Real Time from the drop-down list in the upper right corner.
Real time data is updated in every 10 seconds.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Click the Performance tab, and then click NPV Links.
You see the NPV Links tab window shown in Figure 7-14
Step 2 Expand a fabric and select one of the VSANs to display performance information for the NPV Links in
that VSAN.
Step 3 Click the name of an NPV Link from the Name column to see a list of the traffic for the past 24 hours.
Note There are variations to this procedure. In addition to the basic steps described above, you can also
perform the following steps to view detailed information for NPV Links:
You can change the time range for this information by selecting it from the drop-down list in the
upper right corner.
To view the detailed information for specific period, drag the slider control to choose the time
interval for which you need the information.
To view information in grid format, click the grid icon in the bottom right corner.
To export the data into a spreadsheet, click the excel icon in the upper right corner and then click
Save.
To view real time information, select Real Time from the drop-down list in the upper right corner.
Real time data is updated in every 10 seconds.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and select one of the VSANs to display performance information for the flows in that
VSAN.
Step 3 Click the name of a flow from the Name column to see a list of the traffic for the past 24 hours.
Note There are variations to this procedure. In addition to these basic steps, you can also perform the
following steps to view detailed information for Flows:
To change the time range for this graph, select it from the drop-down list in the upper right corner.
To view the detailed information for specific period, drag the slider control to choose the time
interval for which you need the information.
To view information in grid format, click the grid icon in the bottom right corner.
To export the data into a spreadsheet, click the excel icon in the upper right corner and then click
Save.
To view real time information, select Real Time from the drop-down list in the upper right corner.
Real time data is updated in every 10 seconds.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and choose one of the VSANs to display the Gigabit Ethernet ports and Cisco Nexus
5000 Series Ethernet ports in that VSAN.
Note There are variations to this procedure. In addition to these basic steps, you can also:
Select the time range, and click Filter to filter the display.
Select the name of a GigE port from the Name column to see a graph of the traffic across that GigE
port for the past 24 hours. You can change the time range for this graph by selecting it from the
drop-down list in the upper right corner.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and select one of the VSANs to display the other statistics in that VSAN.
Note There are variations to this procedure. In addition to these basic steps, you can also:
Select the time range, and click Filter to filter the display.
Select the IP address of a switch from the Name column to see a graph of the traffic across that
switch for the past 24 hours. You can change the time range for this graph by selecting it from the
drop-down list in the upper right corner.
Note To configure Other Statistics, follow the instructions described in the Configuring Other Statistics
section on page 7-58.
Step 1 Click the Performance tab, and then click Traffic Analyzer.
You see the Traffic Analyzer tab window as shown in Figure 7-18.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Threshold80%
SAN elements or linksISLs
Performance prediction typeAverage
Click a link in the Name column to view a graph of that ISLs performance for the past 24 hours. To view
the performance for the past week, month, year, or custom time, select an option from the drop-down list.
Step 2 Expand a fabric and select one of the VSANs to specify that the prediction report will be generated for
that VSAN.
Step 3 Select the period of time (Week, Month, 3 Months, 6 Months or Year) to use to predict performance from
the past drop-down list.
Step 4 Select the period of time (Week, Month, 3 Months, 6 Months or Year) for which to make the prediction
from the future drop-down list.
Step 5 Enter the threshold percentage (1100) of utilization that you do not want the traffic to exceed.
Step 6 Enter the number of ISLs, hosts, storage devices, or flows for which you want to make the prediction.
The prediction will show the top 10, top 20, or top 50 with the most traffic.
Step 7 Select the type of traffic prediction to show:
AverageThe average value of all the sample data is used.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PeakThe average value of all the peak values is used. The number of peak values is obtained by
dividing the total number of records into groups based on the number you enter in the Use Peak
Value of Every xx Records field. For example, if you have 1000 records and you enter 100 into the
field, your records are divided into 10 groups and 10 peak values are used.
Step 8 Click Predict.
You see the prediction table with the new data. Click the links in the Name column to show performance
charts based on the history data.
Step 1 Click the Performance tab, and then click Switch Bandwidth.
You see the Switch Bandwidth tab window as shown in Figure 7-20.
Step 2 Select the period of time (24 Hours, Week, Month or Year) for which you want to view bandwidth usage
from the Last drop-down list.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Inventory
The Inventory tab shows an inventory of the selected SAN, fabric, or switch. You can export this
information to an ASCII file in comma-separated value format that can be read by applications such as
Microsoft Excel. You can set the number of rows and columns per page.
The Inventory tab contains the following subtabs:
VSANsShows details about VSANs.
SwitchesShows details about switches.
LicensesShows details about the licenses in use in the fabric.
ModulesShows details for MDS switching and services modules, fans, and power supplies.
End DevicesShows the host and storage ports.
ISLsShows the Inter-Switch Links.
NPV LinksShows the links betweek NPV devices and ports.
ZonesShows the active zone members (including those in inter-VSAN zones).
SummaryShows VSANs, switches, ISLs, ports, and end devices.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Select a SAN to display a summary of inventory information for all fabrics in the SAN.
Select one of the fabrics to display a summary of inventory information for that fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select one of the fabrics to display VSAN inventory information for that fabric.
Note There are variations to this procedure. In addition to these basic steps, you can also:
Select the status level, then click Filter to filter the display to show all VSANs or just those with
errors.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select one of the fabrics to display license information for switches in that fabric.
Note There are variations to this procedure. In addition to these basic steps, you can also:
Select the status level, and click Filter to filter the display to show all licenses or just those with
errors.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Click the Inventory tab, and then click End Devices.
You see the End Devices tab window as shown in Figure 7-27.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and select one of the VSANs to display end device inventory information for that VSAN.
Note If you filter by hosts or enclosures, you can click a host in the resulting table to see host enclosure
performance, a list of hosts, a list of hosts to which your device is connected, and the connection paths.
This allows you to see performance statistics for hosts and enclosures.
You can also filter by end devices or by port groups to view aggregate information for those port groups,
such as peak and average usage.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and select one of the VSANs to display ISL inventory information for that VSAN.
Note There are variations to this procedure. In addition to these basic steps, you can also:
Select the status level, and click Filter to filter the display to show all ISLs or only those with errors.
Step 1 Click the Inventory tab, and then click NPV Links.
You see the NPV Links tab window as shown in Figure 7-29.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and select one of the VSANs to display NPV Links information for that VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Expand a fabric and select one of the VSANs to display zone inventory information for that VSAN.
Note There are variations to this procedure. In addition to these basic steps, you can also:
Select the status level, and click Filter to filter the display to show all zones or just those with errors.
Reports
The Reports tab allows you to create customized reports based on historical performance, events, and
inventory information gathered by the Fabric Manager Server. You can create aggregate reports with
summary and detailed views. You can also view previously saved reports.
The Report tab contains the following subtabs:
ViewDisplays previously saved reports.
GenerateGenerates a custom report based on the selected report template.
EditEdits an existing report template.
CreateCreates a report template, allowing you to select any combination of events, performance
categories, and inventory.
Scheduled JobsDisplays scheduled jobs based on the selected report template.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
and schedule a report of your fabric based on this template immediately or at a later time. Fabric
Manager Web Client saves each report based on the report template used and the time you generate the
report.
To create a custom report template using Fabric Manager Web Client, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 (Optional) Change the name of the report. By default, report names are based on the date and time
generated.
Step 5 (Optional) Uncheck the Use Scope from Template check box to override the scope defined by the filter
type.
Step 6 (Optional) Check the Private check box to change the attribute of the report. If selected, the report can
be viewed only by the specific user and network administrator.
Step 7 (Optional) Check the Email Report check box to receive an e-mail notification.
Step 8 Click Generate to generate a report based on this template.
You see the report results in a new browser window. Alternatively, you can view the report by clicking
Report > View and selecting the report name from the report template you used in the navigation pane.
Step 9 Click Schedule to schedule a report based on this template. You see the schedule panel.
Step 10 In the schedule panel, specify the scheduled run time and how often you want the report to run.
Step 11 Enter a name for the report in the Job Name field and click Create Job to save the report.
You can view the scheduled jobs on the Scheduled Jobs page but once the scheduled jobs have started
running, they are removed from the Scheduled Job table.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Indicate the information you want to gather in the report by checking the Health, Analysis,
Performance, or Inventory check boxes.
Step 4 (Optional) Select a severity level for events, status for inventory information, or type of end device for
performance information and inventory information.
Step 5 (Optional) Check the Private check box to change the attribute of the report. If selected, the report can
be viewed only by the specific user and network administrator.
Step 6 Click Save to save this report template.
Note You cannot change the SAN, fabrics or VSAN the report is based on. Generate a new report for
a new SAN, fabrics or VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Click the Reports tab, and then click Scheduled Jobs.
You see the Scheduled Jobs table window as shown in Figure 7-36.
Step 2 Click a report template in the left navigation pane to view the scheduled jobs based on the selected
template.
Step 1 Click the Reports tab, and then click Scheduled Jobs.
Step 2 In the right pane, click View.
You see the modify options in the Scheduled Jobs table as shown in Figure 7-37.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click the calander next to Start Date to modify the date settings.
Step 4 Select the Start Time drop-down list to modify time settings.
Step 5 Click to select the appropriate radio button to change the frequency of generating report.
Step 6 (Optional) - Check the Email Notification check box to get the report by e-mail.
Step 7 Click Edit Job to save changes.
Admin
Note Only network administrators can access the Fabric Manager Web Client Admin tab. Network operators
cannot view the Admin tab.
The Admin tab allows you to perform minor administrative and configuration tasks on the Fabric
Manager Server sending data to your web client.
The Admin tab contains the following subtabs:
StatusDisplays the status of the Database Server, and allows you to start and stop Performance
Collector services on your server. You should to restart services only if something is not working
properly, or if too large a percentage of system resources are being consumed.
Note You cannot start or stop Database Server services using Fabric Manager Webclient. If
you are using Microsoft Windows operating system, you need to use Microsoft
Management Console to Stop, Start or Restart Database Server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
LogsAllows you to view all the logs from the various services running on the Fabric Manager
Server.
Note If you see a database file lock error in the database log, you can fix it by shutting down and restarting
the database server using the web client.
Step 1 Go to the Web Server installation directory and enter the cd command to access the bin directory.
Step 2 Enter the following line to create a user:
addUser.{sh,bat} <userName> <dbpassword>
Step 3 Choose Admin > Configure > Web Users > Local Database.
You see the list of users in the local database.
Step 4 Select the user that you want to delete and click Delete to remove the old user.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If the word more is in the Status column, you can click it to view a detailed status of the
service.
Note You need to configure Performance collection in order to start, stop or restart Performance
Collector.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Enter the seed switch IP address, read community and write community for this fabric.
Step 5 Enter the user name and password for this fabric.
Step 6 (Optional) Check the SNMPV3 check box. If you check SNMPV3, the fields Read Community and
Write Community change to User Name and Password. You must enter your user name and password.
Step 7 Select the privacy settings from the Auth-Privacy listbox.
Step 8 Click Add to begin managing this fabric.
Step 9 Select the IP address of the server from the Server listbox.
To stop managing a fabric from Fabric Manager Server using Fabric Manager Web Client, follow these
steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Check the check box next to the fabric that you want to remove and click Remove to discontinue data
collection for that fabric.
To edit a fabric from Fabric Manager Server using Fabric Manager Web Client, follow these steps:
Step 4 Enter a new fabric name, user name and password and specify how you want Fabric Manager Server to
manage the fabric by selecting an option from the drop-down list.
Step 5 Click Modify to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 (Optional) Click the Print icon or the Export Report icon for a copy of the information.
Note Fabric Manager Web Client forwards fabric events via e-mail or SNMPv1 traps.
To add a notification forward using Fabric Manager Web Client, follow these steps:
Step 4 In the Type field, either choose E-Mail or SNMP Trap. If you choose Trap, a Port field is added to the
dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 From the Fabric drop-down list, choose the fabric for notification.
Step 6 Either check the VSAN Scope check box to receive notifications for all VSANs, or enter the VSAN IDs
in the ID List field to limit the VSANs for which you want to receive notifications.
Step 7 Enter the e-mail address for notifications in the Address field.
Step 8 From the Minimum Severity drop-down list, select the severity level of the messages to receive.
Step 9 Click Add to add the notification.
Note The traps sent by Fabric Manager Server correspond to the severity type followed by a text description:
trap type(s) = 40990 (emergency) 40991 (alert) 40992 (critical) 40993 (error) 40994
(warning) 40995 (notice) 40996 (info) 40997 (debug)textDescriptionOid = 1, 3, 6, 1, 4, 1,
9, 9, 40999, 1, 1, 3, 0
To remove a notification forward using Fabric Manager Web Client, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Check the check box next to the client you want to disconnect.
Step 4 Click Disconnect.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Enter the IP mask or address of the community in the IP Mask/Address field.
Note The IP mask can contain wildcards (0s) you can use to assign communities to subnets.
To remove a community using Fabric Manager Web Client, follow these steps:
Step 3 Check the check box next to the community that you want to remove and click Remove.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Cisco Fabric Manager 3.0(1) does not require you to make changes to the communities.properties file
even if you are using a Cisco MDS 9020 switch or any third-party devices.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The user name guest is a reserved name (case insensitive). The guest user can only view reports.
The guest user cannot change the guest password, nor can the guest user access the Admin tab
in Fabric Manager Web Client.
Step 5 Select a role for the user from the Role drop-down list.
Step 6 Enter the password in the Password field.
Step 7 Enter the password again in the Confirm Password field.
Step 8 Click Add to add the user to the database.
Step 9 Repeat Steps 3 through 7 to continue adding users.
To remove a user using Fabric Manager Web Client, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To remove a role using Fabric Manager Web Client, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You cannot manage performance collections for multiple devices through a single port interface. Since
only one set of statistics exists per interface, Fabric Manager Web Client can manage performance
collections for only one visible FL or iSCSI device through an interface.
To add a collection using Fabric Manager Web Client, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select a fabric for which to collect performance data from the Fabric drop-down list.
Step 5 Either check the VSAN Scope check box to receive notifications for all VSANs, or enter the VSAN IDs
in the ID List field to limit the VSANs for which you want to collect performance data.
Step 6 Check the check boxes for the type(s) of entities for which you want to collect performance data.
Step 7 Check the check boxes for the type(s) of thresholds you want to enable.
Step 8 Click Create to add the collection and add it to the table.
Step 9 Repeat Steps 3 through 8 to continue adding roles.
Note Performance Manager shows statistics for fabrics that you have configured collections for using the
Collection Wizard.
To remove a collection using Fabric Manager Web Client, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select a fabric for which you want to add other statistics.
Step 5 Select the statistic that you want to add from the Other OID drop-down list and specify a name for the
statistic in the Display Name field.
Step 6 Click Add to add this statistic.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 If you are using absolute values, follow these steps, otherwise skip to Step 3.
a. To configure conditions for sending Critical notifications, check the Send Critical check box. In the
...when traffic exceeds field, enter a number (from 5 to 95) to indicate the percentage at which the
Critical notification is sent. For example, entering 10 causes a notification to be sent when traffic at
any given time exceeds 10% of capacity.
b. To configure conditions for sending Warning notifications, check the Send Warning check box. In
the ...when traffic exceeds field, enter a number (from 5 to 95) to indicate the percentage at which
the Warning notification is sent. For example, entering 9 causes a notification to be sent when traffic
at any given time exceeds 9% of capacity.
Step 4 Select the time period for the collection (1 Week, 1 Month, or 1 Year) from the Baseline Values over past
drop-down list. The baseline value represents the sum of the absolute values.
a. To configure conditions for sending Critical notifications, check the Send Critical check box. In the
...when traffic exceeds field, enter a number to indicate the percentage at which the Critical
notification is sent. For example, entering 300 causes a notification to be sent when traffic for the
selected period exceeds 300% of capacity.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
b. To configure conditions for sending Warning notifications, check the Send Warning check box. In
the ...when traffic exceeds field, enter a number to indicate the percentage at which the Warning
notification is sent. For example, entering 150 causes a notification to be sent when traffic for the
selected period exceeds 150% of capacity.
Step 5 Click Apply.
To configure the RRD database using Fabric Manager Web Client, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Enter the number of days to collect samples at 5-minute intervals in the top row of the Days column.
Step 4 Enter the number of days to collect samples at 30-minute intervals in the second row of the Days column.
Step 5 Enter the number of days to collect samples at 2-hour intervals in the third row of the Days column.
Step 6 Enter the number of days to collect samples at 1-day intervals in the bottom row of the Days column.
Note As of Cisco SAN-OS Release 3.1(1) and later, you can configure the sampling interval for ISLs.
Select a sampling interval from the ISLs drop-down list.
Step 7 Click Apply to apply your changes, or click Defaults to reset the file sizes to the default values.
If you are applying new values, or if the current values are not the default values, you see a message
indicating that conversion of the RRD files will take a certain amount of time and that the database will
be unavailable until then. The time it takes depends on the difference between the old and new values.
Note The system allows you to convert data, one process at a time. When you start converting the data,
the Apply and Default buttons change to Refresh and Cancel so that another process cannot be
inadvertently started. The display is the same for all browsers accessing the server during this
time. Click Refresh to view the latest progress. Click Cancel to cancel the process of converting
the data. If the job is successfully canceled, you see the Apply and Default buttons again. If the
cancel job is not successful, you see a message indicating that the cancellation has failed.
If you want to perform this procedure, it is best to perform it before collecting a lot of data.
Otherwise, converting the data can take a long time.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 8
Performance Manager
The primary purpose of Fabric Manager is to manage the network. A key management capability is
network performance monitoring. This chapter includes the following topics:
Performance Manager Architecture, page 8-1
Flow Statistics Configuration, page 8-6
Note You must restart Performance Manager if you change the user credentials on Fabric Manager Server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Data Interpolation
One of the unique features of Performance Manager is its ability to interpolate data when statistical
polling results are missing or delayed. Other performance tools may store the missing data point as zero,
but this can distort historical trending. Performance Manager interpolates the missing data point by
comparing the data point that preceded the missing data and the data point stored in the polling interval
after the missing data. This maintains the continuity of the performance information.
Data Collection
One years worth of data for two variables (Rx and Tx bytes) requires a round-robin database (rrd) file
size of 76 K. If errors and discards are also collected, the rrd file size becomes 110 K. The default
internal values are as follows:
600 samples of 5 minutes (2 days and 2 hours)
700 samples of 30 minutes (12.5 days)
775 samples of 2 hours (50 days)
300 samples of 1 day
A 1000-port SAN requires 110 MB for a years worth of historical data that includes errors and discards.
If there were 20 switches in this SAN with equal distribution of fabric ports, about two to three SNMP
packets per switch would be sent every 5 minutes for a total of about 100 request or response SNMP
packets required to monitor the data.
Because of their variable counter requests, flows are more difficult to predict storage space requirements
for. But in general you can expect that, each extra flow adds another 76 KB.
Note Performance Manager does not collect statistics on nonmanageable and non-MDS switches. Loop
devices (FL/NL) are not collected.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
8 weeks
Mon 1/3 Mon 1/10 Mon 1/17 Mon 2/21 @2 PM
Threshold
setting
Average X Mon 2/28 @2 PM
Daily (option)
14 days
Mon 2/14 Tues 2/15 Wed 2/16 Sun 2/27 @2 PM
Threshold
setting
Average X Mon 2/28 @2 PM
130886
Percent over baseline (e.g. 130%)
The threshold is set for Monday at 2 p.m. The baseline threshold is set at 130% of the average for that
statistic. The average is calculated from the statistics value that occurred at 2 p.m. on Monday, for every
prior Monday (for the weekly option) or the statistics value that occurred at 2 p.m. on each day, for every
prior day (for the daily option).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To verify the newly created flow, choose Physical Attributes > End Devices > Flow Statistics. The
newly created flows are displayed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 9
Cisco Traffic Analyzer
Cisco Traffic Analyzer is a version of network top (ntop) software that is modified to support Fibre
Channel and SCSI.
This chapter contains the following sections:
Understanding SPAN, page 9-1
Using Cisco Traffic Analyzer with Performance Manager, page 9-2
Installing Cisco Traffic Analyzer, page 9-3
Accessing Traffic Analyzer from Fabric Manager Web Server, page 9-5
Understanding SPAN
The SPAN feature is specific to switches in the Cisco MDS 9000 Family. It monitors network traffic
though a Fibre Channel interface. Traffic through any Fibre Channel interface can be replicated to a
special port called the SPAN destination port (SD port). Any Fibre Channel port in a switch can be
configured as an SD port. Once an interface is in SD port mode, it cannot be used for normal data traffic.
You can attach a Fibre Channel analyzer to the SD port to monitor SPAN traffic.
SD ports do not receive frames, they transmit a copy of the SPAN source traffic. The SPAN feature is
nonintrusive and does not affect switching of network traffic for any SPAN source ports (see Figure 9-1).
SD port
For information on configuring SPAN, refer to the Cisco MDS 9000 Family CLI Configuration Guide.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note We recommend that you install Traffic Analyzer and Performance Manager on separate servers. Linux
server is recommended for installing Traffic Analyzer.
Figure 9-2 shows how Performance Manager works with Cisco Traffic Analyzer to monitor traffic on
your fabric.
Figure 9-2 Overview of Performance Manager Working with Cisco Traffic Analyzer
Network mgmt0
port
113485
PC PC PC
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Cisco Traffic Analyzer for Fibre Channel throughput values are not accurate when used with the original
Cisco Port Analyzer Adapter (PAA) if data truncation is enabled. PAA Version 2 (product ID
DS-PAA_2) is required to achieve accurate results with truncation, because it adds a count that enables
Cisco Traffic Analyzer to determine how many data bytes were actually transferred.
Note Refer to the Cisco MDS 9000 Family CLI Configuration Guide for information on configuring the
settings for your SPAN destination port. It is important that the data you collect through this port matches
the data collected by Performance Manager through the mgmt0 port. If the data does not match, you
cannot view Cisco Traffic Analyzer information through a Traffic Analyzer link on the detail page of a
Performance Manager report.
Step 1 Open a browser and go to the following website to access the web page where Cisco Traffic Analyzer is
available:
http://cisco.com/cgi-bin/tablebuild.pl/mds-fm.
Step 2 Download fc-ntop.tar.gz and install it using the instructions at the following website:
http://www.ntop.org.
Step 3 Verify that the Fibre Channel port on the PAA-2 is connected to the SD port on the switch (Figure 9-2).
Step 4 Verify that the Ethernet port on the PAA-2 is connected to the workstation running Cisco Traffic
Analyzer.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Click Interfaces > SPAN in Device Manager to configure SPAN on the required switch ports.
Step 6 Click Interfaces > SPAN in Device Manager to verify that the Fibre Channel port connected to the
PAA-2 is configured as an SD port. The port mode of the destination interface must be SD.
Step 7 Click the Sessions tab in Device Manager to verify the correct destination and source of traffic (ingress).
Caution Cisco Traffic Analyzer must not be used with the PAA-2 in Management mode (MNM). Refer to the
Cisco MDS 9000 Family Port Analyzer Adapter 2 Installation and Configuration Note.
Step 1 Open a browser and go to the following website to access the web page where Cisco Traffic Analyzer is
available:
http://cisco.com/cgi-bin/tablebuild.pl/mds-fm.
Step 2 Download ntop-win32.zip and save it on your workstation.
Step 3 Unzip the downloaded file.
Note You need the WinPcap library file to use Cisco Traffic Analyzer on a Microsoft Windows
system.You can download this file from the following website:
http://winpcap.polito.it/.
Step 4 Open a command prompt and change directories to your ntop installation directory.
Step 5 Type ntop -i or install ntop as a service on Windows by following these steps:
a. Type ntop /i to install ntop as a service.
b. Choose Start > Programs > Administrative Tools > Services to access the Windows Services
Panel.
c. Right-click ntop and choose properties. You see the Properties dialog box.
d. Set the Start Parameters to -i interface number, where interface number is the number of the
interface on your workstation that connects to the PAA-2.
e. Click Start to start ntop on that interface.
Note Subsequent restarts of the ntop service do not require setting the -i option. unless you are
changing the interface that connects to the PAA-2.
Step 6 Verify that the Fibre Channel port on the PAA-2 is connected to the SD port on the switch (Figure 9-2).
Step 7 Verify that the Ethernet port on the PAA-2 is connected to the workstation running Cisco Traffic
Analyzer.
Step 8 Click Interfaces > SPAN in Device Manager to configure SPAN on the required switch ports.
Step 9 Click the Sources tab in Device Manager to verify that the Fibre Channel port connected to the PAA-2
is configured as an SD port. The port mode of the destination interface must be SD.
Step 10 Click the Sessions tab in Device Manager to verify the correct destination and source of traffic (ingress).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip To modify the script that launches ntop (ntop.sh or ntop.bat), follow the instructions provided within the
script file. Create a backup of the original script before modifying the file.
Linux platforms use the shell script path. The ntop output is sent to the syslog file (/var/log/messages
by default).
Windows platforms use the batch file. The ntop output is sent to a file located in the same directory
as the one from which ntop is launched.
Step 1 Choose the Performance tab and then the Traffic Analyzer tab.
You see a summary table of all SPAN destination ports and configured Traffic Analyzers in your fabric
(see Figure 9-3). The source column shows the ports that are monitored by the SPAN destination port.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click a Traffic Analyzer to launch that Traffic Analyzer within Fabric Manager Web Server.
To rediscover instances of Traffic Analyzer running in your fabric using Fabric Manager Web Server,
follow these steps:
Step 2 Navigate to the fabric or VSAN where you want to rediscover instances of Traffic Analyzer from the
navigation bar.
Step 3 Set Analyzers on Subnet to the subnet that you want to discover.
Step 4 Click Discover to find instances of Traffic Analyzer within the selected fabric or VSAN and subnet.
PA R T 2
CH A P T E R 10
Obtaining and Installing Licenses
Licenses are available in all switches in the Cisco MDS 9000 Family. Licensing allows you to access
specified premium features on the switch after you install the appropriate license for that feature.
This chapter contains information related to licensing types, options, procedures, installation, and
management for the Cisco MDS NX-OS software.
This chapter includes the following sections:
Licensing Terminology, page 10-1
Licensing Model, page 10-2
Licensing High Availability, page 10-8
Options to Install a License, page 10-8
Obtaining a Factory-Installed License, page 10-9
Performing a Manual Installation, page 10-9
Obtaining the License Key File, page 10-9
Installing the License Key File, page 10-10
Installing Licenses Using Fabric Manager License Wizard, page 10-11
Installing or Updating Licenses Using Device Manager, page 10-12
Identifying License Features in Use, page 10-13
Uninstalling Licenses, page 10-14
Updating Licenses, page 10-14
Grace Period Alerts, page 10-15
License Transfers Between Switches, page 10-16
Displaying License Information, page 10-16
Fabric Manager Server Licensing, page 10-17
Licensing Terminology
The following terms are used in this chapter:
Licensed featurePermission to use a particular feature through a license file, a hardware object,
or a legal contract. This permission is limited to the number of users, number of instances, time span,
and the implemented switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Licensing Model
Any feature not included in a license package is bundled with the Cisco MDS 9000 Family switches and
is provided at no extra charge.
We recommend that you do not download more licenses than can be used for a module or switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
See Chapter 11, On-Demand Port Activation Licensing for information about on-demand port
activation licensing.
The licensing model defined for the Cisco MDS product line has two options:
Feature-based licenses allow features that are applicable to the entire switch. The cost varies based
on a per-switch usage. Table 10-1 lists the feature-based license packages.
Module-based licenses allow features that require additional hardware modules. The cost varies
based on a per-module usage. An example is the IPS-8 or IPS-4 module using the FCIP feature.
Note Each module requires its own separate license. If you replace a module that requires a
license with a module of the same type (such as replacing a Storage Services Module (SSM)
with another SSM), the existing license will support the new module.
Note The Cisco MDS 9216i and the Cisco MDS 9222i switches enable SAN extension features on the two
fixed IP services ports only. The features enabled on these ports are identical to the features enabled by
the SAN extension over IP license on the 14/2-port Multiprotocol Services (MPS-14/2) module. If you
install a module with IP ports in the empty slot on the Cisco MDS 9216i or the Cisco MDS 9222i switch,
a separate SAN extension over IP license is required to enable related features, such as FCIP, on the IP
ports of the additional module.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note License packages for Cisco DMM (Cisco Data Mobility Manager) and Cisco SME (Cisco Storage Media
Encryption) are documented in the Cisco MDS Data Mobility Manager Configuration Guide, and the
Cisco Storage Media Encryption Configuration Guide.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Contact your reseller or Cisco representative and request this service.
Note If you purchased Cisco support through a Cisco reseller, contact the reseller directly. If you
purchased support directly from Cisco Systems, contact Cisco Technical Support at this URL:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
Your switch is shipped with the required licenses installed in the system. The proof of purchase
document is sent along with the switch.
Step 2 Obtain the host ID from the proof of purchase document for future use.
Step 3 Start to use the switch and the licensed features.
Website URL
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Select Physical > Inventory from the main menu. You see the inventory for the switch. The host ID is
referred to as the serial number.
Tip Prepend the serial number with VDH=. For example, if the serial number is FOX064317SQ, the
full serial number is VDH=FOX064317SQ.
Step 2 Obtain either your claim certificate or your proof of purchase document. This document accompanies
every Cisco MDS switch.
Step 3 Obtain the Product Authorization Key (PAK) from either the claim certificate or the proof of purchase
document.
Step 4 Locate the website URL from either the claim certificate or the proof of purchase document.
Step 5 Access the specified URL that applies to your switch and enter the switch serial number and the PAK.
The license key file is sent to you by e-mail. The license key file is digitally signed to only authorize use
on the requested switch. The requested features are also enabled once the Cisco NX-OS software on the
specified switch accesses the license key file.
Caution Install the license key file in the specified MDS switch without making any modifications.
A license is either permanent or it expires on a fixed date. If you do not have a license, the grace period
for using that feature starts from the first time you start using a feature offered by that license (see the
Grace Period Alerts section on page 10-15).
Step 6 Use the copy licenses command in EXEC mode to save your license file to one of two locationsthe
bootflash: directory or the slot0: device . Refer to the Cisco MDS 9000 Family CLI Configuration Guide
for more information.
Tip If you need to install multiple licenses in any switch in the Cisco MDS 9000 Family, be sure to provide
unique file names for each license key file.
The best way to install licenses on the switches in your fabric is to use the License Wizard provided in
Fabric Manager. You can also use Device Manager to install licenses on each switch individually.
Note You do not need a license to access a switch with Fabric Manager. See the Licensing Model section
on page 10-2 for a list of features requiring licenses.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Log into a switch in the fabric containing the switches for which you want to install licenses.
To install licenses on multiple switches, you do not need to log into each switch; however, the switches
must be in the fabric you are viewing.
Step 2 Start the License Wizard by selecting Tools > Install >License. Or, you can select Licenses under
Switches in the Physical Attributes pane.
You see the license information in the Information pane, one line per feature.
Step 3 Click the Keys tab, and then click the License Install Wizard icon in the toolbar.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 8 Select the switches for which you have PAKs or license key files.
When you check the check box for a switch, the PAK or license file name field for that switch becomes
editable. The serial number for each switch is shown in the Host ID column.
Step 9 Enter the PAK or license file name for each switch you have selected in the appropriate column. If you
have the license files on your PC, you can double-click in the License File Name text area to bring up a
dialog box and browse for the license files.
You can install multiple licenses on the same switch using different PAKs. To do this, enter the PAKs
separated by commas.
Step 10 Click Finish to transfer the licenses from the host to the switches.
Fabric Manager accesses the appropriate license site and installs the licenses onto each switch. The
status of each installation is displayed in the Status column, as follows:
successInstall or uninstall operation completed successfully.
inProgressLicense install or uninstall operation is in progress.
corruptedLicenseFileLicense file content is invalid or corrupted.
targetLicenseFileAlreadyExistTarget license file-name already exists.
invalidLicenseFileNameLicense file does not exist.
duplicateLicenseLicense file is already installed.
generalLicensingFailureGeneral error from License Manager.
noneNo install operation is performed.
licenseExpiryConflictLicense exists with a different expiration date for the feature.
invalidLicenseCountLicense count is invalid for the feature.
Step 11 Click the Close button to close the wizard. To install more licenses at this point, you must close the
wizard and launch it again.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Click Install if you are installing, or Update if you are updating.
You see the status of the installation at the bottom of the dialog box, as follows:
successInstall or uninstall operation completed successfully.
inProgressLicense install or uninstall operation is in progress.
corruptedLicenseFileLicense file content is invalid or corrupted.
targetLicenseFileAlreadyExistTarget license file name already exists.
invalidLicenseFileNameLicense file does not exist.
duplicateLicenseLicense file is already installed.
generalLicensingFailureGeneral error from License Manager.
noneNo install operation is performed.
licenseExpiryConflictLicense exists with a different expiration date for the feature.
invalidLicenseCountLicense count is invalid for the feature.
notThisHostLicense host ID in the license file does not match.
licenseInGraceMoreNumber of licenses in grace period is more than the number in the install
license file.
licenseFileNotFoundLicense file not found for the install, uninstall, or update operation.
licenseFileMissingA previously installed license file is found missing.
invalidLicenseFileExtensionLicense file does not have a .lic extension.
invalidURIInvalid license file URI specified for install operation.
noDemoLicenseSupportDemo license not supported.
invalidPlatformInvalid platform.
Step 6 Repeat Steps 3 through 5 to install another license, or click Close to close the License Manager dialog
box.
Step 1 Select a switch from the Fabric pane, or select a group of switches (SAN, fabric, VSAN) from the
Logical Domains pane.
Step 2 Select Licenses under Switches in the Physical Attributes pane.
You see the contents of the Feature Usage tab in the Information pane, with installed licenses listed in
the Feature column.
Step 3 Click the Usage tab.
You see the features currently in use in the Application column.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Uninstalling Licenses
You can only uninstall a permanent license that is not in use. If you try to delete a permanent license that
is currently being used, the software rejects the request and issues an error message. Uninstalling an
unused license causes the grace period to come into effect. The grace period is counted from the first use
of the feature without a license and is reset when a valid license file is installed.
Note Permanent licenses cannot be uninstalled if they are currently being used. Features turned on by
permanent licenses must first be disabled, before that license is uninstalled.
Tip If you are using an evaluation license and would like to install a new permanent license, you can do so
without service disruption and before the evaluation license expires. Removing a permanent license
immediately triggers a grace period without service disruption.
Caution Disable related features before uninstalling a license. The delete procedure fails if the license is in use.
Step 1 Log into the switch. If you are using Fabric Manager to remove licenses from multiple switches, you do
not need to log in to each switch; however, the switches must be in the fabric you are viewing.
Step 2 From the Fabric Manager Physical Attributes pane, select Licenses under Switches. You see the license
information in the Information pane, one line per feature.
From Device Manager, click Admin > Licenses from the menu. You see the Licenses dialog box.
Step 3 In Fabric Manager, click the Keys tab. You see the list of License Key files. Click the name of the license
you want to remove, and press the Delete keyboard key or click the Delete Row icon in the toolbar.
In Device Manager, click Uninstall, and enter the name of the License Key file you want to remove.
Click Apply to remove the License Key file, and click Close to close the dialog box.
Note To delete a license, you must disable the features enabled by that license. The delete procedure
fails if the license is in use, and an error message is displayed.
Updating Licenses
If your license is time bound, you must obtain and install an updated license. Contact technical support
to request an updated license.
Note If you purchased Cisco support through a Cisco reseller, contact the reseller directly. If you purchased
support directly from Cisco Systems, contact Cisco Technical Support at this URL:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Obtain the updated license file using the procedure described in the Obtaining the License Key File
section on page 10-9.
Step 2 Save your running configuration to a remote server using the copy command (see the Copying Files
section on page 16-5).
Step 3 Verify the name of the file to be updated.
Step 4 Follow the procedure for updating a license described in the Uninstalling Licenses section on
page 10-14.
Note There is no grace period for licenses purchased for the On-Demand Port Activation license feature.
The grace period stops if you disable a feature you are evaluating, but if you enable that feature again
without a valid license, the grace period countdown continues where it left off.
The grace period operates across all features in a license package. License packages can contain several
features. If you disable a feature during the grace period and there are other features in that license
package that are still enabled, the countdown does not stop for that license package. To suspend the grace
period countdown for a license package, you must disable every feature in that license package.The
Cisco NX-OS license counter keeps track of all licenses on a switch. If you are evaluating a feature and
the grace period has started, you will receive console messages, SNMP traps, system messages, and Call
Home messages on a daily basis. The frequency of these messages become hourly during the last seven
days of the grace period.
The following example uses the FICON feature. On January 30th, you enabled the FICON feature, using
the 120-day grace period. You will receive grace period ending messages as:
Daily alerts from January 30th to May 21st.
Hourly alerts from May 22nd to May 30th.
On May 31st, the grace period ends, and the FICON feature is automatically disabled. You will not be
allowed to use FICON until you purchase a valid license.
Note You cannot modify the frequency of the grace period messages.
Caution After the final seven days of the grace period, the feature is turned off and your network traffic may be
disrupted. Any future upgrade will enforce license requirements and the 120-day grace period.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you purchased Cisco support through a Cisco reseller, contact the reseller directly. If you purchased
support directly from Cisco Systems, contact Cisco Technical Support at this URL:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
Step 1 Select Licenses under Switches in the Physical Attributes pane. You see the license information in the
Information pane, one line per feature.
Step 2 Click the Feature Usage tab to see the switch, the name of the feature package, the type of license
installed, the number of licenses used (Installed Count), the expiration date, the grace period (if you do
not have a license for a particular feature), and any errors (for example, if you have a missing license).
Step 3 Click the Keys tab to display the information about each of the License Key files installed on your
switches.
Caution Once an expiration period has started, notifications appear in the Fabric Managers Events
pane on a daily basis. During the last seven days of the expiration period, these messages are
displayed hourly. After the final seven days of the expiration period, the feature is turned off
and your network traffic may be disrupted.
Step 4 Click the Usage tab to see the applications using the feature package on each switch. Use this tab to
determine which applications depend on each license installed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the Features tab to see the name of the feature package, the type of license, the expiration date,
the grace period (if you do not have a license for a particular feature), and any errors, such as a missing
license.
Step 3 Click the Files tab to display the information about each of the License Key files installed on your
switch.
Step 4 Click the Install tab to install or update a license file.
Step 5 Click the Usage tab to which applications are using the features on the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 11
On-Demand Port Activation Licensing
This chapter describes how to use the on-demand port activation licensing feature on the Cisco MDS
9124 Fabric Switch, the Cisco MDS 9134 Fabric Switch, the Cisco Fabric Switch for HP c-Class
BladeSystem, and the Cisco Fabric Switch for IBM BladeCenter. This chapter contains the following
sections:
About On-Demand Port Activation Licensing, page 11-1
Configuring Port Activation Licenses, page 11-4
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Port-Naming Conventions
Table 11-1 describes the port-naming conventions for the four Cisco Fabric switches.
Cisco MDS 9124 Cisco MDS 9134 Cisco Fabric Switch for HP Cisco Fabric Switch for
Switch Switch c-Class BladeSystem IBM BladeCenter
fc1/1 through fc1/24 fc1/1 through fc1/34 Internal ports: bay1 Internal ports: bay1
through bay16 through bay14
External ports: ext1 External ports: ext0 and
through ext8 ext15 through ext19
Port Licensing
On the Cisco MDS 9124 Switch, the first eight ports are licensed by default. You are not required to
perform any tasks beyond the default configuration unless you prefer to immediately activate additional
ports, make ports ineligible, or move port licenses.
Figure 11-1 shows the ports that are licensed by default for the Cisco MDS 9124 Switch.
Figure 11-1 Cisco MDS 9124 Switch Default Port Licenses (fc1/1 - fc1/8)
159831
If you need additional connectivity, you can activate additional ports in 8-port increments with each
on-demand port activation license, up to a total of 24 ports.
On the Cisco MDS 9134 Switch, the first 24 ports that can operate at 1 Gbps, 2 Gbps, or 4 Gbps are
licensed by default. If you need additional connectivity, you can activate the remaining eight ports with
one on-demand port activation license. A separate 10G license file is required to activate the remaining
two 10-Gbps ports.
Figure 11-2 shows the ports that are licensed by default for the Cisco MDS 9134 Switch.
Figure 11-2 Cisco MDS 9134 Switch Default Port Licenses (fc1/1 - fc1/24)
184089
Figure 11-3 shows the external ports that are licensed by default for the Cisco Fabric Switch for HP
c-Class BladeSystem.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 11-3 Cisco Fabric Switch for HP c-Class BladeSystem Default Port Licenses (ext1 - ext4)
182072
!
On the Cisco Fabric Switch for HP c-Class BladeSystem, any eight internal ports and the external ports
(ext1 through ext4) are licensed by default. A single on-demand port activation license is required to use
the remaining eight internal and four external ports.
On the Cisco Fabric Switch for IBM BladeCenter, any seven internal ports and the external ports( ext0,
ext15 and ext16) are licensed by default. A single on-demand port activation license is required to use
the remaining seven internal and three external ports.
Figure 11-4 shows the external ports that are licensed by default for the Cisco Fabric Switch for IBM
BladeCenter.
Figure 11-4 Cisco Fabric Switch for IBM BladeCenter Default Port Licenses (ext0, ext15 - ext16)
!
4cb
15
16
17
18
19
182074
If you do not prefer to accept the default behavior and would rather assign a license to a specific port,
make the port ineligible to receive a license, or move licenses among ports, refer to the Configuring
Port Activation Licenses section on page 11-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
.
Table 11-2 Port Activation License Status Definitions
By default, when you install additional port license activation packages, the activation status of ports
changes from eligible to acquired. If you prefer to accept the default behavior, no further action is
required.
Note You can uninstall licenses for ports not in use; however, you cannot uninstall default licenses.
Note The dialog boxes shown in Figures 11-5 and 11-6 apply only to the Cisco MDS 9124 Fabric Switch.
To check the number of licenses that are in use using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The dialog box shown in Figure 11-7 applies only to the Cisco MDS 9124 Fabric Switch.
To make multiple ports eligible to acquire a license using Device Manager, follow these steps:
Step 1 Choose Interface > FC All and click the License tab or hold down the Control key, and then click each
port that you want to make eligible.
Step 2 Right-click the selected ports, select Configure, and click the License tab.
You see the FC Interfaces dialog box as shown in Figure 11-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select eligible from the Config drop-down list for each port that you want to make eligible.
Step 4 Click Apply to save the changes.
Note The dialog box shown in Figure 11-8 applies only to the Cisco MDS 9124 Fabric Switch.
To make a single port eligible to acquire a license using Device Manager, follow these steps:
Step 1 Right-click a port, select Configure, and click the License tab.
You see the port licensing options for the selected port as shown in Figure 11-8.
Step 2 Click the eligible radio button to make the port eligible.
Step 3 Click Apply to save the changes.
Step 1 Choose Interface > FC All and click the License tab or hold down the Control key, and then click each
port for which you want to acquire a license.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Right-click the selected ports, select Configure, and click the License tab.
You see the FC Interfaces dialog box as shown in Figure 11-7.
Step 3 Select acquire from the Config drop-down list for each port that you want to acquire a license.
Step 4 Click Apply to save the changes.
To acquire a license for a single port using Device Manager, follow these steps:
Step 1 Right-click a port, select Configure, and click the License tab.
You see the port licensing options for the selected port as shown in Figure 11-8.
Step 2 Click the acquire radio button to acquire a license for the port.
Step 3 Click Apply to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 12
Initial Configuration
Most of the initial switch configuration procedures can only be performed using the CLI. Refer to the
Cisco MDS 9000 Family CLI Configuration Guide for this information. This chapter includes the
following sections:
Assigning a Switch Name, page 12-1
Verifying the Module Status, page 12-2
Configuring Date, Time, and Time Zone, page 12-3
NTP Configuration, page 12-4
Management Interface Configuration, page 12-10
Telnet Server Connection, page 12-11
Configuring CDP, page 12-12
Note The Cisco Fabric Switch for IBM BladeCenter does not use admin as the default user. The default user
is USERID because there is no console access to the switch. You cannot delete the user USERID on this
switch. The password for this default user is PASSW0RD, where the 0 is a zero. You can change this
password; however, a write erase operation restores the default password. There is no initial setup menu.
Also note that you should not bring up the loader> prompt; the only way to fix this condition is to RMA
the switch.
The following commands are not allowed on the Cisco Fabric Switch for IBM BladeCenter: write erase
boot and init system. You also cannot set boot variables manually.
Step 1 Expand SAN in the Logical Domains pane, select a fabric or a VSAN from the Logical Domains pane.
Step 2 Expand Switches in the Physical Attributes pane.
You see a list of switches in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Double-click the Logical Name of the switch you want to change in the Information pane.
You see the name highlighted with a blinking cursor next to it.
Step 4 Type the new name of the switch (see Figure 12-1).
Step 5 Click the Apply Changes icon.
Step 6 Right-click the Fabric pane map and choose Refresh to see your changes.
Step 1 Expand SAN in the Logical Domains pane, then select a fabric or a VSAN from the Logical Domains
pane.
Step 2 Expand Switches and choose Hardware in the Physical Attributes pane.
You see the contents of the Inventory tab in the Information pane shown in Figure 12-2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If the status is OK or active, you can continue with your configuration (see Chapter 19, Managing
Modules).
Step 1 Expand SAN, then select a fabric or a VSAN in the Logical Domains pane.
You see a list of switches in the Information pane.
Step 2 Expand Switches and select Clock in the Physical Attributes pane.
You see the clock information in the Information pane shown in Figure 12-3.
Step 3 Double-click the time in the ClockDateAndTime field for the switch to change.
Step 4 Enter the date, time, and time zone in the format YYYY/MM/DD-hh:mm:ss ZONE,
Where:
YYYY is the year (2002)
MM is the month (08)
DD is the date (23)
hh represents hours in military format (15 for 3 p.m.)
mm is minutes (58)
ss is seconds (09)
ZONE is GMT + or - number of hours
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you do not enter a time zone, GMT is used as the default.
Note The date and time changes are saved across system resets.
Note CFS does not support daylight savings time because a single fabric can span multiple time zones; every
switch must be configured individually.
If you want to configure daylight savings time on multiple switches simultaneously, see the RUN CLI
command feature in the Cisco MDS 9000 Family Fabric Manager Configuration Guide.
NTP Configuration
A Network Time Protocol (NTP) server provides a precise time source (radio clock or atomic clock) to
synchronize the system clocks of network devices. NTP is transported over User Datagram Protocol
UDP/IP. All NTP communications use Universal Time Coordinated (UTC). An NTP server receives its
time from a reference time source, such as a radio clock or atomic clock, attached to the time. NTP
distributes this time across the network.
This section includes the following sections:
About NTP, page 12-4
NTP Configuration Guidelines, page 12-5
Configuring NTP, page 12-6
Editing an NTP Server or Peer Configuration, page 12-6
Deleting an NTP Server or Peer, page 12-7
NTP CFS Distribution, page 12-8
About NTP
In a large enterprise network, having one time standard for all network devices is critical for management
reporting and event logging functions when trying to correlate interacting events logged across multiple
devices. Many enterprise customers with extremely mission-critical networks maintain their own
stratum-1 NTP source.
Time synchronization happens when several frames are exchanged between clients and servers. The
switches in client mode know the address of one or more NTP servers. The servers act as the time source
and receive client synchronization requests.
By configuring an IP address as a peer, the switch will obtain and provide time as required. The peer is
capable of providing time on its own and is capable of having a server configured. If both these instances
point to different time servers, your NTP service is more reliable. Thus, even if the active server link is
lost, you can still maintain the right time due to the presence of the peer.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip If an active server fails, a configured peer helps in providing the NTP time. Provide a direct NTP server
association and configure a peer to ensure backup support if the active server fails.
If you only configure a peer, the most accurate peer takes on the role of the NTP server and the other
peer(s) acts as a peer(s). Both machines end at the right time if they have the right time source or if they
point to the right NTP source.
Stratum-2 Stratum-2
Peer association
Server-1 Server-2
Server Server
association association
Peer association
85532
Switch-1 Switch-2
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Configuring NTP
You can configure NTP using either IPv4 addresses, IPv6 addresses, or DNS names.
To create an NTP server or peer, follow these steps:
Step 1 In the Fabric Manager Physical pane, expand Switches, and then select System, or from Device
Manager, choose Admin > NTP.
In Fabric Manager, you see the System information pane. In Device Manager, you see the NTP dialog
box (see Figure 12-5).
Step 1 In the Fabric Manager Physical Attributes pane, expand Switches, and then select System, or from
Device Manager, choose Admin > NTP.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In Fabric Manager, you see the System information pane. In Device Manager, you see the NTP dialog
box.
Step 2 Click the NTP Peer tab.
You see a list of NTP peers and servers for that switch.
Step 3 Change the peer address by double-clicking the IP address in the Peer Address column, and changing
the numbers. Alternatively, you can triple click the IP address and type in a new address.
Step 4 Change the switch mode from peer to server by clicking the Mode column next to the address of the
switch.
You see a drop-down list. Select the mode (peer or server) you want for the switch.
Step 5 Change the peer status of the switch to Preferred Peer by checking the PrefPeer check box next to the
address of the switch. To remove this status, uncheck the check box.
Step 6 Click Apply to apply your changes to the switch, or click Close to close the dialog box without saving
your changes.
Step 1 In the Fabric Manager Physical pane, expand Switches and choose System, or from Device Manager,
choose Admin > NTP.
In Fabric Manager, you see the System information pane. In Device Manager, you see the NTP dialog
box.
Step 2 Click the NTP Peer tab.
You see a list of NTP peers and servers for that switch.
Step 3 Delete a server or peer by clicking the IP address in the Peer Address column. The Delete button is
enabled.
Step 4 Click Delete to delete the peer or server, or click Close to close the dialog box without deleting the peer.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches, expand Clock, and then select NTP in the Physical Attributes pane.
You see the feature configuration in the Information pane.
Step 2 Click the CFS tab in the Information pane.
You see the CFS configuration and status for each switch.
Step 3 Click a switch value in the Global column, enable or disable.
A drop-down menu appears (see Figure 12-6).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note A warning displays if you do not enable CFS for all switches in the fabric for this feature.
Step 6 Check the Master check box for the switch that you want to act as the merge master for this feature.
Step 7 Click the switch value in the Config Action column. A drop-down menu appears.
Step 8 Select Commit.
Step 9 Click the Servers tab in the Information pane. You see the configuration for this feature based on the
master switch.
Step 10 Modify the Master configuration as needed. For example, right-click the value in the Master column and
select Create Row to create a server for NTP.
a. Set the ID, and the Name or IP Address for the NTP server.
b. Choose a Mode radio button and, optionally, check the Preferred check box.
c. Click Create to add the server.
Fabric Manager sends the request to the master switch. Click the CFS tab and check the Last Results
column for the new entry. It has a pending status.
Step 11 From the CFS tab, set the Config Action column to commit to distribute the feature change through the
fabric. Fabric Manager only changes the status to running when commit, clear, or abort is selected and
applied.
Note Fabric Manager will not change the status to pending if enable is selected, because the pending
status does not apply until the first actual change is made.
Step 12 Click the Apply Changes icon to commit the configuration changes for that feature and distribute the
changes through CFS, or click Undo Changes to discard the changes for that feature.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip The changes are only available in the volatile directory and are subject to being discarded if the switch
is restarted.
Note Before you begin to configure the management interface manually, obtain the switchs IPv4 address and
IPv4 subnet mask or the IPv6 address. Also make sure the console cable is connected to the console port.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default
gateway Router
Console IP Address IP
connection 172.16.1.1 Network
Telnet or CLI
SSH
Switch 2
DNS server
mgmt 0
(IP address: GUI
172.16.1.2)
SNMP
Management LAN
79937
(Ethernet connection)
Note For information on connecting a terminal to the supervisor module console port, refer to the Cisco MDS
9200 Series Hardware Installation Guide or the Cisco MDS 9500 Series Hardware Installation Guide.
Tip A maximum of 16 sessions are allowed in any switch in the Cisco MDS 9500 Series or the Cisco MDS
9200 Series.
Make sure the terminal is connected to the switch and that the switch and terminal are both powered on.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Configuring CDP
The Cisco Discovery Protocol (CDP) is an advertisement protocol used by Cisco devices to advertise
itself to other Cisco devices in the same network. CDP runs on the data link layer and is independent of
Layer 3 protocols. Cisco devices that receive the CDP packets cache the information to make it is
accessible through the CLI and SNMP.
CDP is supported on the management Ethernet interface on the supervisor module and the Gigabit
Ethernet interfaces on the IPS and MPS-14/2 modules. The CDP daemon is restartable and switchable.
The running and startup configurations are available across restarts and switchovers.
CDP version 1 (v1) and version 2 (v2) are supported in Cisco MDS 9000 Family switches. CDP packets
with any other version number are silently discarded when received.
When the interface link is established, CDP is enabled by default and three CDP packets are sent at
one-second intervals. Following this, the CDP frames are sent at the globally configured refresh interval.
To globally disable CDP using Fabric Manager, follow these steps:
To globally configure the message interval for the CDP protocol using Device Manager, follow these
steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To globally configure the hold time advertised in CDP packets using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 13
Using the CFS Infrastructure
The Cisco MDS NX-OS software uses the Cisco Fabric Services (CFS) infrastructure to enable efficient
database distribution and to foster device flexibility. It simplifies SAN provisioning by automatically
distributing configuration information to all switches in a fabric.
Several Cisco MDS NX-OS applications use the CFS infrastructure to maintain and distribute the
contents of a particular applications database.
This chapter contains the following sections:
About CFS, page 13-1
Disabling CFS Distribution on a Switch, page 13-4
CFS Application Requirements, page 13-5
Enabling CFS for an Application, page 13-5
Locking the Fabric, page 13-6
Committing Changes, page 13-7
Discarding Changes, page 13-8
Saving the Configuration, page 13-8
Clearing a Locked Session, page 13-8
CFS Merge Support, page 13-9
Displaying CFS Configuration Information, page 13-9
CFS Regions, page 13-16
CFS Example Using Fabric Manager, page 13-20
CFS Example Using Device Manager, page 13-23
Default Settings, page 13-23
About CFS
Many features in the Cisco MDS switches require configuration synchronization in all switches in the
fabric. Maintaining configuration synchronization across a fabric is important to maintain fabric
consistency. In the absence of a common infrastructure, such synchronization is achieved through
manual configuration at each switch in the fabric. This process is tedious and error prone.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Cisco Fabric Services (CFS) provides a common infrastructure for automatic configuration
synchronization in the fabric. It provides the transport function as well as a rich set of common services
to the applications. CFS has the ability to discover CFS capable switches in the fabric and discovering
application capabilities in all CFS capable switches.
This section includes the following topics:
Cisco MDS NX-OS Features Using CFS, page 13-2
CFS Features, page 13-2
CFS Protocol, page 13-3
CFS Distribution Scopes, page 13-3
CFS Distribution Modes, page 13-4
CFS Features
CFS has the following features:
Peer-to-peer protocol with no client-server relationship at the CFS layer.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CFS Protocol
The CFS functionality is independent of the lower layer transport. Currently, in Cisco MDS switches,
the CFS protocol layer resides on top of the FC2 layer and is peer-to-peer with no client-server
relationship. CFS uses the FC2 transport services to send information to other switches. CFS uses a
proprietary SW_ILS (0x77434653) protocol for all CFS packets. CFS packets are sent to or from the
switch domain controller addresses.
CFS can also use IP to send information to other switches (see the CFS Distribution over IP section
on page 13-10).
Applications that use CFS are completely unaware of the lower layer transport.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Uncoordinated Distribution
Uncoordinated distributions are used to distribute information that is not expected to conflict with that
from a peer. An example is local device registrations such as iSNS. Parallel uncoordinated distributions
are allowed for an application.
Coordinated Distribution
Coordinated distributions can have only one application distribution at a given time. CFS uses locks to
enforce this. A coordinated distribution is not allowed to start if locks are taken for the application
anywhere in the fabric. A coordinated distribution consists of three stages:
1. A fabric lock is acquired.
2. The configuration is distributed and committed.
3. The fabric lock is released.
Coordinated distribution has two variants:
CFS driven The stages are executed by CFS in response to an application request without
intervention from the application.
Application drivenThe stages are under the complete control of the application.
Coordinated distributions are used to distribute information that can be manipulated and distributed
from multiple switches, for example, the port security configuration.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 In the information pane, from the drop-down menu, choose disable or enable for a switch.
Step 3 Click the Apply Changes icon to commit the configuration changes.
To globally disable or enable CFS distribution on a switch using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The application configuration is not distributed by CFS unless distribution is explicitly enabled for that
application.
To enable CFS for a feature using Fabric Manager, follow these steps:
Step 1 Choose a feature on which to enable CFS. For example, expand Switches > Events, and then select
CallHome in the Physical Attributes pane. The Information pane shows that feature, with a CFS tab.
Click the CFS tab to display the CFS state for each switch in the fabric for that feature.
Step 2 Decide on which switch(es) to enable CFS. Set the Admin column to either enable to enable CFS or
disable to disable CFS.
Note Enable CFS for all switches in the fabric or VSAN for the feature that uses CFS.
Step 3 Right-click the row you changed to see the pop-up menu. Select Apply Changes to apply the CFS
configuration change. The CFS tab updates as the CFS changes take effect.
Fabric Manager retrieves the status of the CFS change and updates the Last Result column.
To enable CFS for a feature using Device Manager, follow these steps:
Note Enable or disable CFS for all switches in the fabric or VSAN for the feature that uses CFS.
Step 3 Click Pending Differences to compare the configuration of this feature on this switch to other switches
in the fabric or VSAN that have CFS enabled for this feature. Close the Show Pending Diff pop-up.
Step 4 Click Apply to apply the CFS configuration change.
Device Manager retrieves the status of the CFS change and updates the Last Command and Result
columns.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Committing Changes
A commit operation saves the pending database for all application peers and releases the lock for all
switches.
In general, the commit function does not start a session; only a lock function starts a session. However,
an empty commit is allowed if configuration changes are not previously made. In this case, a commit
operation results in a session that acquires locks and distributes the current database.
When you commit configuration changes to a feature using the CFS infrastructure, you receive a
notification about one of the following responses:
One or more external switches report a successful statusThe application applies the changes
locally and releases the fabric lock.
None of the external switches report a successful stateThe application considers this state a failure
and does not apply the changes to any switch in the fabric. The fabric lock is not released.
You can commit changes for a specified feature by setting CFS > Config Action to commit for that
feature.
To commit changes using Fabric Manager for CFS-enabled features, follow these steps:
Step 1 Choose the feature you want to enable CFS for. For example, expand Switches expand Events, and then
select CallHome from the Physical Attributes pane.
The Information pane shows that feature, with a CFS tab.
Step 2 Click the CFS tab to display the CFS state for each switch in the fabric for that feature.
Step 3 Right-click the value in the Config Action column for any switch and select an option from the
drop-down menu (Copy, Paste, Export to File, Print Table, Detach Table).
Step 4 Click the Apply Changes icon to commit the configuration changes for that feature and distribute the
changes through CFS.
Fabric Manager retrieves the status of the CFS change and updates the Last Command and Last Result
columns for the feature or VSAN.
To commit changes using Device Manager for CFS-enabled features, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Device Manager retrieves the status of the CFS change and updates the Last Command and Result
columns.
Caution If you do not commit the changes, they are not saved to the running configuration.
Discarding Changes
If you discard configuration changes, the application flushes the pending database and releases locks in
the fabric. Both the abort and commit functions are only supported from the switch from which the fabric
lock is acquired.
You can discard changes for a specified feature by setting the Command column value to disable for that
feature then clicking Apply.
Caution If you do not commit the changes, they are not saved to the running configuration.
The CISCO-CFS-MIB contains SNMP configuration information for any CFS-related functions. Refer
to the Cisco MDS 9000 Family MIB Quick Reference for more information on this MIB.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Exercise caution when using this function to clear locks in the fabric. Any pending configurations in any
switch in the fabric is flushed and lost.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The switch attempts to distribute information over Fibre Channel first and then over the IP
network if the first attempt over Fibre Channel fails. CFS does not send duplicate messages if
distribution over both IP and Fibre Channel is enabled.
Note CFS cannot distribute over both IPv4 and IPv6 from the same switch.
Keepalive mechanism to detect network topology changes using a configurable multicast address.
Compatibility with Cisco MDS SAN-OS Release 2.x.
Distribution for logical scope applications is not supported because the VSAN implementation is
limited to Fibre Channel.
Figure 13-2 shows a network with both Fibre Channel and IP connections. Node A forwards an event to
node B over Fibre Channel. Node B forwards the event node C and node D using unicast IP. Node C
forwards the event to node E using Fibre Channel.
FC
144860
Node D
IP
Figure 13-3 is the same as Figure 13-2 except that node C and node D are connected using Fibre
Channel. All processes is the same in this example because node B has node C and node D the
distribution list for IP. Node C does not forward to node D because node D is already in the distribution
list from node B.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FC
144861
Node D
IP
Figure 13-4 is the same as Figure 13-3 except that node D and node E are connected using FC. Both node
C and node D forward the event to E because the node E is not in the distribution list from node B.
FC
144862
Node D
IP
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If a new NPV switch is added to the fabric, you must launch the NPV CFS Setup wizard to update the
list, because Fabric Manager does not update the list automatically.
Step 1 From the Fabric Manager menu, select Tools > Other > NPV CFS Setup .
The NPV Device Selection dialog box is displayed with the list of NPV device peers retrieved from the
switch including the device name, device IP address, and the status of the peer.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 From the NPV Device to retrieve peer list from drop-down list box, select the device to retrieve the
peer list from.
If the NPV device in the list retrieved from the switch is present in the fabric, then one of the following
statuses is displayed: Local, Reachable, Unreachable, or Discovery in Progress. If the NPV device is not
present in the fabric, then the status is displayed as Not in Fabric.
Note If the status is displayed as Not in Frabic, you must remove the device from the list.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select the peers, and then click Ok to add the peers to the list.
The peers are added to the list with To Be Added status.
Step 5 Click Set to confirm adding the peers to the list and start the peers list propogation by CFS.
Step 1 From the Fabric Manager menu, select Tools > Other > NPV CFS Setup.
The NPV CFS Setup wizard is launched.
Step 2 From the NPV Device to retrieve peer list from drop-down list box, select the device to retrieve the
peer list from which you want to delete a peer.
Step 3 Do one of the following tasks to mark the peer or local host as deleted:
To delete a peer from the peer list, select the peer from the list, and then click Delete.
To delete the local host from the peer list, select the local NPV device and click Delete, or select all
the peers in the list, and then click Delete All.
Step 4 Click Yes to delete the peer from the list.
Step 5 Click Set in the NPV CFS wizard. The following message box is displayed:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Click Yes to remove the deleted peer or localhost from all the other NPV device peer lists, and start
dynamic peer discovery using multicast in the deleted peer.
-------------------------------------------------------------
IP address WWN name Status
-------------------------------------------------------------
1.2.3.4 00:00:00:00:00:00:00:00 Discovery Inprogress
1.2.3.5 20:00:00:0d:ec:06:55:b9 Reachable
1.2.3.6 20:00:00:0d:ec:06:55:c0 Local
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CFS Regions
This section contains the following topics:
About CFS Regions, page 13-16
Managing CFS Regions Using Fabric Manager, page 13-17
Creating CFS Regions, page 13-17
Assigning Features to CFS Regions, page 13-17
Moving a Feature to a Different Region, page 13-18
Removing a Feature from a Region, page 13-19
Deleting CFS Regions, page 13-19
Note You can only configure a CFS region on physical switches in a SAN. You cannot configure a
CFS region in a VSAN.
Example CFS Scenario: Call Home is an application that triggers alerts to Network Administrators
when a situation arises or something abnormal occurs. When the fabric covers many geographies and
with multiple Network Administrators who are each responsible for a subset of switches in the fabric,
the Call Home application sends alerts to all Network Administrators regardless of their location. For
the Call Home application to send message alerts selectively to Network Administrators, the physical
scope of the application has to be fine tuned or narrowed down, which is achieved by implementing CFS
regions.
CFS regions are identified by numbers ranging from 0 through 200. Region 0 is reserved as the default
region, and contains every switch in the fabric. You can configure regions from 1 through 200. The
default region maintains backward compatibility. If there are switches on the same fabric running
releases of SAN-OS before release 3.2(1), only features in Region 0 are supported when those switches
are synchronized. Features from other regions are ignored when those switches are synchronized.
If the feature is moved, that is, assigned to a new region, its scope is restricted to that region; it ignores
all other regions for distribution or merging purposes. The assignment of the region to a feature has
precedence in distribution over its initial physical scope.
You can configure a CFS region to distribute configurations for multiple features. However, on a given
switch, you can configure only one CFS region at a time to distribute the configuration for a given
feature. Once you assign a feature to a CFS region, its configuration cannot be distributed within another
CFS region.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand the Switches folder in the Physical Attributes pane and click CFS.
The information pane displays the Global, IP Multicast, Feature by Region, and All Regions tabs.
Step 2 Click the All Regions tab.
The tab displays a list of Switches and RegionIds.
Step 3 Click the Create Row button on the toolbar.
Figure 13-10 shows the Create a Region dialog box.
Step 4 From the drop-down list, select the switch and choose a RegionId from the range.
Step 5 Click Create.
Upon successful creation of the region, Success is displayed at the bottom of the dialog box.
Step 1 Expand the Switches folder in the Physical Attributes pane and click CFS.
The information pane displays the Global, IP Multicast, Feature by Region, and All Regions tabs.
Step 2 Click the Feature by Region tab.
This tab lists all the switches along with their corresponding Feature and RegionId.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
When a feature is assigned to a new region using the Feature by Region tab, a new row with the new
region is created automatically in the table under the All Regions tab. Alternatively, you can create a
region using the All Regions tab.
Note In the Feature by Region tab, when you try to reassign a feature on a switch to another region by
clicking Create Row, an operation failed message is shown. The error message states that an entry
already exists. However, moving a feature to a different region is a different task and it is described in
the next section.
Step 1 Expand the Switches folder in the Physical Attributes pane and select CFS.
The information pane displays the Global, IP Multicast, Feature by Region, and All Regions tabs.
Step 2 Click the Feature by Region tab.
Figure 13-12 shows the Feature by Region tab, which lists all the switches along with their feature and
region details.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Click the Feature by Region tab and select the required row.
Step 2 Click the Delete Row button on the toolbar.
Figure 13-13 shows a confirmation dialog box.
Step 3 Click Yes to confirm row deletion from the table in view.
Step 1 Click the All Regions tab and select the required row.
Step 2 Click Delete Row.
This action removes all entries pertaining to that switch and region in the table under Feature by Region
tab.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Select the CFS-capable feature you want to configure. For example, expand a VSAN, and then select
Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane.
Step 2 Click the CFS tab.
You see the CFS configuration and status for each switch (see Figure 13-15).
Step 3 From the Feature Admin drop-down list, select enable for each switch.
Step 4 Repeat step 3 for all switches in the fabric.
Note A warning is displayed if you do not enable CFS for all switches in the fabric for this feature.
Step 5 Check the Master check box for the switch to act as the merge master for this feature.
Step 6 From the Config Action drop-down list, select commit Changes for each switch that you enabled for
CFS.
Step 7 Click the Servers tab in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see the configuration for this feature based on the master switch (see Figure 13-16).
Step 8 Modify the feature configuration. For example, right-click the name in the Master column and select
Create Row to create a server for NTP.
a. Set the ID and the Name or IP Address for the NTP server.
b. Set the Mode radio button and optionally check the Preferred check box.
c. Click Create to add the server.
Step 10 Click the Commit CFS Pending Changes icon to save the changes (see Figure 13-18).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 12 From the Config Action drop-down list, select abortChanges for each switch that you enabled for CFS
(see Figure 13-20).
Note Fabric Manager does not change the status to pending if enable is selected, because the pending
status does not apply until the first actual change is made.
Step 13 Click the Apply Changes icon to commit the configuration changes for that feature and distribute the
changes through CFS.
Note When using CFS with features such as DPVM and device alias, you must select commit at the end of
each configuration. If the session is locked, you must exit the feature by selecting abort.
To configure the master or seed switch for distribution for each feature using Fabric Manager, follow
these steps:
Step 1 Choose the feature that needs a merge master for CFS. For example, expand Switches, expand Events
and select CallHome from the Physical Attributes pane.
The Information pane shows that feature including a CFS tab.
Step 2 Click the CFS tab to display the CFS state for each switch in the fabric for that feature.
Step 3 Check the Master column check box for the switch to act as the merge master for this feature.
Step 4 Click the Apply Changes icon to select this switch as master for future CFS distributions.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Open the dialog box for any CFS-capable feature. Device Manager checks to see whether CFS is
enabled. It also checks to see if there is a lock on the feature by checking for at least one entry in the
Owner table. If CFS is enabled and there is a lock, Device Manager sets the status to pending for that
feature. You see a dialog box displaying the lock information.
Step 2 Click Continue or Cancel when prompted. If you continue, Device Manager remembers the CFS status.
Step 3 Choose Admin > CFS (Cisco Fabric Services) to view the user name of the CFS lock holder.
Step 4 Click the locked feature and click Details.
Step 5 Click the Owners tab and look in the UserName column.
Note Device Manager does not monitor the status of the feature across the fabric until you click
Refresh. If a user on another CFS-enabled switch attempts to configure the same feature, they
do not see the pending status. However, their configuration changes are rejected by your
switch.
Step 6 If CFS is enabled and there is no lock, Device Manager sets the status to running for that feature.
You then see a dialog box for the feature. As soon as you perform a creation, deletion, or modification,
Device Manager changes the status to pending and displays the updated information from the pending
database.
Step 7 View the CFS table for a feature. Device Manager only changes the status to running when commit,
clear, or abort is selected and applied. Device Manager will not change the status to pending if enable
is selected, because the pending status does not apply until the first actual change is made.
The Last Command and Result fields are blank if the last command is noOp.
Note When using CFS with features like DPVM and device alias, you must select commit at the end of each
configuration. If the session is locked, you must exit the feature by selecting abort.
Default Settings
Table 13-1 lists the default settings for CFS configurations.
Parameters Default
CFS distribution on the switch Enabled.
Database changes Implicitly enabled with the first configuration change.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
Application distribution Differs based on application.
Commit Explicit configuration is required.
CFS over IP Disabled.
IPv4 multicast address 239.255.70.83
IPv6 multicast address ff15::efff:4653
CH A P T E R 14
Configuring FlexAttach Virtual pWWN
This chapter describes the FlexAttach virtual port world-wide name (pWWN) feature and includes the
following sections:
About FlexAttach Virtual pWWN, page 14-1
FlexAttach Virtual pWWN Guidelines and Requirements, page 14-2
Configuring FlexAttach Virtual pWWN, page 14-2
Using the Server Admin FlexAttach Wizards, page 14-9
Difference Between San Device Virtualization and FlexAttach Port Virtualization, page 14-23
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Server MobilityA server can be moved to another port on the same NPV device or another NPV
device without changing the SAN. This is accomplished by moving the virtual pWWN to the new
port. No change is needed if FlexAttach was configured using the physical port WWN of the server
to the virtual port WWN mapping.
Note The port must be in a shut state when the virtual pWWN is enabled.
To enable virtual pWWN automatically for all the interfaces, follow these steps:
Step 1 From the Device Manger menu bar, select FC > FlexAttach. (Figure 14-1).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Check the VirtualPwwnAuto check box to enable automatic generation of virtual WWNs on all the
fabric port interfaces.
Note When the interface-list value is not included in the command, virtual pWWN is enabled globally.
All the interfaces mentioned in the interface-list value must be in a shut state.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Some ports may be in automode, some in manual mode, and the virtual pWWNs need not be
assigned.
The port must be in a shut state when a virtual pWWN is enabled.
.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The interface mentioned in the interface value must be in a shut state.
The virtual port WWN value for the selected interface in Fabric Manager is automatically generated.
(Figure 14-5).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The interface mentioned in the interface value must be in a shut state.
Step 1 In the FlexAttach window, select the Physical to Virtual WWNs tab.
You see the Physical to Virtual WWNs tab view as shown in Figure 14-6.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The LastChange field displays the time when the virtual pWWN was changed.
Note The interface must be in a shut state and the specified Virtual pWWN should not be logged in.
The Figure 14-7 shows the Physical to Virtual pWWNs tab view in the Fabric Manager.
Note The specified virtual pWWN and the real pWWN must not be logged in.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note NPV switches do not have ISL (E or TE ports) and are linked through IPv4.
Step 1 Log in to Fabric Manager with a username and password that has the server-admin role assigned.
Step 2 Discover and open the fabric on which you want to configure FlexAttach.
Step 3 In the Fabric Manager window displayed, select Tools > FlexAttach to display the list of wizards.
(Figure 14-8).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 In the Fabric Manger window, select Tools > FlexAttach > Pre-configure Server.
The Pre-Configure Wizard is displayed. (Figure 14-9)
Step 2 In the Pre-Configure Server window, click the Basic radio button to configure a common setting to all
the ports on one or more switches.
The Basic Configuration window is displayed. (Figure 14-10)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 In the Basic Configuration window, check the check box to select one or more switches from the list of
NPV switches in the fabric.
Step 4 Check the Enable FlexAttach Auto on every port check box to enable FlexAttach on all the ports of
all the selected switches.
Step 5 (Optional) From the VSAN ID drop-down list, select a VSAN ID to assign the selected VSAN ID to all
the ports.
Note Only the set of VSANs to which all the selected switches belong are listed. If no VSAN ID is
selected, then the existing VSAN configuration is retained.
Step 6 Click the Up or Down radio button to assign the selected interface status.
Note The status of only the F ports in the selected switches will be brought to up or down.
Step 7 Click Finish to pre-configure the selected settings to all the ports on all the selected switches.
The Configuration window is displayed with the finished message. (Figure 14-11)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 In the Fabric Manger window, select Tools > FlexAttach > Pre-configure Server.
The Pre-Configure Server window is displayed. (Figure 14-9)
Step 2 In the Pre-Configure Server window, click the Advanced radio button to configure FlexAttach on each
port individually.
The Pre-Configure Server Advanced configuration window is displayed. (Figure 14-12)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 In the Interface tab, click to select a switch from the list of switches displayed in the left pane.
The switch configuration details are displayed in the right pane with tabs and columns.
Step 4 Configure the following settings, for each interface:
In the Status column corresponding to the interface, double-click and then select up or down from
the drop-down list.
In the VSAN column corresponding to the interface, double-click and then select the VSAN ID from
the drop-down list of existing VSAN IDs.
In the Auto column corresponding to the interface, double-click and then select Auto to
automatically enable FlexAttach or select Manual to manually enable FlexAttach later.
In the Interface vPWWN cell, enter the vPWWN if Manual was selected in the Auto FlexAttach
configuration cell.
Note You can click Set All Auto to change all the interfaces with manual FlexAttach
configuration to Auto on the selected switch. However, if a valid vPWWN value is already
configured, then changing it to Auto does not change the configuration. Before you change
from Manual to Auto, update the Interface vPWWN column with the
00:00:00:00:00:00:00:00 value.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 From the Select Switch drop-down list, select the switch to display the existing pWWN to Virtual
PWWN mapping table for the CFS region to which the switch belongs, and then follow these steps to
add vPWWN to vPWWN automap entries:
a. Click Add Row to display the PWWN to vPWWN dialog box.
b. Enter the pWWN and the corresponding virtual pWWN.
c. Click Create to add the mapping list.
Note To delete an existing mapping, select the row, and then click Delete Row. Only one pWWN to
vPWWN table can be updated at a time. To update the table for each CFS region, perform
Step 6 though Step 8 for a switch from each CFS region.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 In the Fabric Manger window, select Tools > FlexAttach > Move Server.
The Move Server wizard is displayed. (Figure 14-14)
Step 2 In the Move Server window, click the Another Port on the Same Switch radio button or click the
Another Port on a Different Switch radio button.
Step 3 Click Next.
The Move Port window is displayed. (Figure 14-15)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 From the Select a Switch drop-down list, select the switch.
The switch ports are listed. To support moving a server from a failed port that is in down state, the ports
in down state are also listed.
Step 5 From the list of interfaces, select the port from which you want to move the server from.
Step 6 Click Next.
The New Port window is displayed. (Figure 14-16)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 From the Select a Switch drop-down list box, select the switch.
Note If the Another Port on the Same Switch radio button was chosen, then the Select Switch
drop-down list is disabled.
Step 8 From the list of interfaces, select the port to which you want to move the server to.
Step 9 Click Next.
The Server WWN window is displayed. (Figure 14-17)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 10 In the Server WWN window, enter the existing server virtual port WWN to be moved.
Step 11 Click Finish.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 In the Fabric Manger window, select Tools > FlexAttach > Replace Server.
The Replace Failed Server window is displayed. (Figure 14-18)
Step 2 In the Replace Server Wizard, click the On Same Port radio button.
Step 3 Click Next.
The Failed Port window is displayed. (Figure 14-19)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 In the Failed Port selection window, from the Select a Switch drop-down list, select the switch.
Step 5 From the list of interfaces displayed, select the port on which the server needs to be replaced.
Step 6 Click Next.
The Server WWN window is displayed. (Figure 14-20)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 In the Server WWN window, enter the existing FlexAttach server virtual port WWN to be replaced, and
the new server physical port WWN.
Step 8 Click Finish to complete the FlexAttach configuration for the new server.
Step 1 In the Fabric Manger window, select Tools > FlexAttach > Replace Server.
The Replace Failed Server wizard is displayed. (Figure 14-18)
Step 2 In the Replace Failed Server wizard, click the With Spare Server on Same NPV Switch radio button.
Step 3 Click Next.
The Choose Failed Port window is displayed. (Figure 14-19)
Step 4 In the Choose Failed Port selection window, from the Select a Switch drop-down list, select the switch.
Step 5 From the list of interfaces displayed, select the port from which the server needs to be detached.
Step 6 Click Next.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 9 In the Server WWN window displayed, enter the existing FlexAttach server virtual port WWN to be
replaced, and the new server physical port WWN.
Step 10 Check the Allow wizard to change from pWWN to vPWWN mapping to interface to vPWWN
mapping check box to remove the pWWN to vPWWN entry from the CFS Region mapping table, and
configure the mapping only at the interface.
Step 11 Click Finish to complete the FlexAttach configuration for the spare server.
Step 1 In the Fabric Manger window, select Tools > FlexAttach > Replace Server.
The Replace Server wizard is displayed. (Figure 14-18)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 In the Replace Server wizard, click the With Spare Server on a Different NPV switch radio button.
Step 3 Click Next.
The Failed Server Port window is displayed. (Figure 14-19)
Step 4 In the Failed Server Port selection window, from the Select a Switch drop-down list, select the switch.
Step 5 From the list of interfaces displayed, select the port from which the server needs to be detached.
Step 6 Click Next.
The New Port window is displayed. (Figure 14-16)
Step 7 In the New Port selection window, select the switch and the port on which the spare server is connected.
Step 8 Click Next.
The Server WWN window is displayed. (Figure 14-21)
Step 9 In the Server WWN window displayed, enter the existing FlexAttach server virtual port WWN to be
replaced, and the new server physical port WWN.
Step 10 Check the Allow wizard to change from pWWN to vPWWN mapping to interface to vPWWN
mapping check box to remove the pWWN to vPWWN entry from the CFS Region mapping table, and
configure the mapping only at the interface.
Step 11 Click Finish to complete the FlexAttach configuration for the spare server.
WWN NAT and Fibre Channel ID (FC-ID) are WWN and Network Address Transport (NAT) is
allocated on the virtual device, both primary and allocated to host bus adapter (HBA).
secondary.
FC-ID rewrite on the switch indicates a No rewrite requirements.
rewrite-capable switch on the path.
Configuration is distributed. This allows Configuration distribution is not required for any
programming rewrites and connectivity of the interface-based configurations.
anywhere.
Configuration is secured to device alias. Does not require device alias for virtual pWWN.
Does not allow automapping to the secondary Allows automapping to the new HBA. Mapping
device. process is manual for NPIV.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 15
Software Images
This chapter describes how to install and upgrade Cisco MDS software images. It includes the following
sections:
About Software Images, page 15-1
Essential Upgrade Prerequisites, page 15-3
Software Upgrade Methods, page 15-5
Automated Upgrades, page 15-6
Using the Software Install Wizard, page 15-8
Nondisruptive Upgrades on Fabric and Modular Switches, page 15-13
Maintaining Supervisor Modules, page 15-14
Installing Generation 2 Modules in Generation 1 Chassis, page 15-16
Replacing Modules, page 15-17
Default Settings, page 15-17
Note Unless explicitly stated, the software install procedures in this chapter apply to any switch in the Cisco
MDS 9000 Family.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Software imagesThe kickstart and system image files reside in directories or folders that can be
accessed from the Cisco MDS 9000 Family switch prompt.
Image versionEach image file has a version.
Flash disks on the switchThe bootflash: resides on the supervisor module and the CompactFlash
disk is inserted into the slot0: device.
Supervisor modulesThere are single or dual supervisor modules.
Selecting the Correct Software Images for Cisco MDS 9100 Series Switches
The Supervisor-1 and Supervisor-2 modules supported by Cisco MDS 9100 Series switches require
different system and kicstart images. You can determine which images to use on your switch by the
naming conventions shown in Table 15-1.
Table 15-1 Supervisor Module Software Image Naming Conventions for MDS 9100 Series
Selecting the Correct Software Images for Cisco MDS 9200 Series Switches
The Supervisor-1 and Supervisor-2 modules supported by Cisco MDS 9200 Series switches require
different system and kicstart images. You can determine which images to use on your switch by the
naming conventions shown in Table 15-2.
Table 15-2 Supervisor Module Software Image Naming Conventions for MDS 9200 Series
Selecting the Correct Software Images for Cisco MDS 9500 Family Switches
The Supervisor-1 and Supervisor-2 modules supported by Cisco MDS 9500 Family switches require
different system and kickstart images. You can determine which images to use on your switch by the
naming conventions shown in Table 15-3.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 15-3 Supervisor Module Software Image Naming Conventions for MDS 9500 Series
Before attempting to migrate to any software image version, follow these guidelines:
Customer Service
Before performing any software upgrade, contact your respective customer service representative to
review your software upgrade requirements and to provide recommendations based on your current
operating environment.
Note If you purchased Cisco support through a Cisco reseller, contact the reseller directly. If you
purchased support directly from Cisco Systems, contact Cisco Technical Support at this URL:
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
Scheduling
Schedule the upgrade when the fabric is stable and steady. Ensure that everyone who has access to
the switch or the network is not configuring the switch or the network during this time. All
configurations are disallowed at this time.
Space
Verify that sufficient space is available in the location where you are copying the images. This
location includes the active and standby supervisor module bootflash: (internal to the switch).
Standby supervisor module bootflash: file system (see Chapter 12, Initial Configuration).
Internal bootflash: offers approximately 200 MB of user space.
Hardware
Avoid power interruption during any install procedure. These kinds of problems can corrupt the
software image.
Connectivity (to retrieve images from remote servers)
Configure the IPv4 address or IPv6 address for the 10/100/1000 BASE-T Ethernet port
connection (interface mgmt0).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Ensure the switch has a route to the remote server. The switch and the remote server must be in
the same subnetwork if you do not have a router to route traffic between subnets.
Images
Ensure that the specified system and kickstart images are compatible with each other.
If the kickstart image is not specified, the switch uses the current running kickstart image.
If you specify a different system image, ensure that it is compatible with the running kickstart
image.
Retrieve images in one of two ways:
Local fileImages are locally available on the switch.
Network fileImages are in a remote location and the user specifies the destination using the
remote server parameters and the file name to be used locally.
Terminology
Table 15-4 summarizes terms used in this chapter with specific reference to the install and upgrade
process.
Term Definition
bootable The modules ability to boot or not boot based on image compatibility.
impact The type of software upgrade mechanismdisruptive or nondisruptive.
install-type reset Resets the module.
sw-reset Resets the module immediately after switchover.
rolling Upgrades each module in sequence.
copy-only Updates the software for BIOS, loader, or bootrom.
Tools
Verify connectivity to the remote server by clicking Verify Remote Server in the Software
Install Wizard in Fabric Manager.
Ensure that the required space is available for the image files to be copied by using Software
Install Wizard to check free disk space.
We recommend the Software Install Wizard in Fabric Manager to upgrade your software. This
wizard upgrades all modules in any Cisco MDS 9000 Family switch (see the Benefits of Using
the Software Install Wizard section on page 15-6).
Run only one installation on a switch at any time.
Do not issue another command while running the installation.
Do the installation on the active supervisor module, not the standby supervisor module.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If the switching module(s) are not compatible with the new supervisor module image, some
traffic disruption may be noticed in the related modules, depending on your configuration.
These modules are identified in the summary when you use the Installation Wizard. You can
choose to proceed with the upgrade or end at this point.
Note The Software Install Wizard displays a summary of changes that are made to your
configuration.
Note Prior to Cisco SAN-OS Release 3.0, to preserve the FC IDs in your configuration, verify that the
persistent FC ID feature is enabled before rebooting. This feature is enabled by default. In earlier
releases, the default is disabled. See the FC IDs section on page 25-16.
Note For high availability, you need to connect the ethernet port for both active and standby
supervisors to the same network or virtual LAN. The active supervisor owns the one IP address
used by these Ethernet connections. On a switchover, the newly activated supervisor takes over
this IP address.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip The Software Install Wizard compares and presents the results of the compatibility before proceeding
with the installation. You can exit if you do not want to proceed with these changes.
Automated Upgrades
The Software Install Wizard upgrades all modules in any Cisco MDS 9000 Family switch. Figure 15-1
provides an overview of the switch status before and after using Software Install Wizard.
154732
2.1(2b) 2.1(2b) 3.0(1) 3.0(1)
The Software Install Wizard automatically verifies if the standby supervisor module is functioning (if
present). If it is not functioning, it reloads that module and uses the force download option to force it
to function.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
After a switchover process, you can see the progress from both the supervisor modules.
Before a switchover process, you can only see the progress from the active supervisor module.
The Software Install Wizard automatically checks the image integrity. This includes the running
kickstart and system images.
The Software Install Wizard performs a platform validity check to verify that a wrong image is not
used. For example, to check if an MDS 9500 Series image is used inadvertently to upgrade an MDS
9200 Series switch.
After issuing the installation, if any step in the sequence fails, the wizard completes the step in
progress and ends.
For example, if a switching module fails to be updated for any reason (for example, due to an
unstable fabric state), then the command sequence disruptively updates that module and ends. In
such cases, you can verify the problem on the affected switching module and upgrade the other
switching modules.
Caution If the installation is ended, be sure to verify the state of the switch at every stage and reissue the
command after 10 seconds. If you reissue the installation within the 10-second span, it is rejected with
an error message indicating that an installation is currently in progress.
Tip All configurations are disallowed while the installation is in progress. However, configurations coming
through the CFS applications are allowed and may affect the upgrade procedure.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The Software Install Wizard supports installation and upgrade for Cisco MDS 9020 Fabric Switch or
Cisco FabricWare. For successful installation and upgrade, specify the TFTP server address that the
Cisco MDS 9020 Fabric Switch should use.
Note Before you use this wizard, be sure the standby supervisor management port is connected.
Step 1 Click the Software Install Wizard icon in the toolbar (see Figure 15-2).
You see the Select Switches dialog box with all switches selected by default.
Step 2 Deselect the check box for the switch(es) for which you do not want to install images on. You must have
at least one switch selected to proceed (see Figure 15-3).
Step 3 Click Next when finished.
Step 4 (Optional) Check the Skip Image Download check box and click Next to use images that are already
downloaded (the file is already on the bootflash). Proceed to Step 7.
You see the Specify Software Image(s) by Model Dialog Box shown in Figure 15-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Click the row under the System, Kickstart, ASM-SFN, or SSI columns to enter image URIs. You must
specify at least one image for each switch to proceed.
Step 6 Click Next.
You see the Check Flash Free Space dialog box (see Figure 15-5). This dialog box shows the active (and
standby, if applicable) bootflash space on each switch, and shows the status (whether there is enough
space for the new images). If any switch has insufficient space, you cannot proceed. Deselect the switch
without enough bootflash by going back to the first screen and unchecking the check box for that switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see the Start Install dialog box shown in Figure 15-6.
Note There is no limit on the number of switches you can upgrade. However, the upgrade is a serial
process; that is, only a single switch is upgraded at a time.
Step 8 (Optional) Check the Ignore version check results check box to bypass a version check.
Step 9 (Optional) Check the Ignore Actual Install and only do Version Check check box to perform a version
check.
You see the Version Check Results dialog box shown in Figure 15-7
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The version check provides information about the impact of the upgrade for each module on the
switch. It also shows any HA-related incompatibilities that might result. You see a final dialog
box at this stage, prompting you to confirm that this check should be performed. We recommend
that you do not ignore the version check results.
Caution If Ignore version check results is checked, the upgrade will proceed even if the current
switch version is newer than the version you are installing.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note On hosts where the TFTP server cannot be started, a warning is displayed. The TFTP server may
not start because an existing TFTP server is running or because access to the TFTP port 69 has
been denied for security reasons (the default setting on Linux). In these cases, you cannot
transfer files from the local host to the switch.
Note Before exiting the session, be sure the upgrade process is complete. The wizard will display a
status as it goes along. Check the lower left-hand corner of the wizard for the status message
Upgrade Finished. First, the wizard displays the message Success followed a few seconds later
by InProgress Polling. Then the wizard displays a second message Success before displaying the
final Upgrade Finished.
Caution Any software upgrade for the Caching Services Module (CSM) and the IP Storage (IPS) services
modules is disruptive.
CSMs and IPS modules use a rolling upgrade install mechanism to guarantee a stable state for each
module in the switch:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Each IPS module in a switch requires a 5-minute delay before the next IPS module is upgraded. See
Chapter 52, Configuring IP Storage for more information on IPS modules.
Each CSM module requires a 30-minute delay before the next CSM module is upgraded. See the
Cisco MDS 9000 Family SAN Volume Controller Configuration Guide for more information on
CSMs.
Note During the upgrade the control plane is down, but the data plane remains up. So new devices will be
unable to log in to the fabric via the control plane, but existing devices will not experience any disruption
of traffic via the data plane.
Before attempting to upgrade any software images on these fabric switches, follow these guidelines:
During the upgrade, the fabric must be stable. None of the following configuration activities are
allowed:
Zoning changes
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Telnet sessions
Schedule changes
Switch cabling
Addition or removal of physical devices
Configure the FSPF timers to the default value of 20 seconds.
If there are any CFS commits pending in the fabric, the upgrade is aborted.
If there is a zone server merge in progress, the upgrade is aborted.
Check whether there is sufficient space available in the system to load the new images using the
Software Install Wizard. At this point you need to either abort the upgrade or proceed with a
disruptive upgrade.
On the Cisco MDS 18/4-port multiservice module, upgrades of the 4-Gigabit Ethernet ports for the
hybrid Supervisor 18/4 line card will be disruptive.
Caution It is recommended that you enable port-fast on the Ethernet interface of the Catalyst switch to which the
management interface of the fabric switch is connected. This is to avoid spanning-tree convergence time
on the Catalyst switch and packets from the fabric switch are forwarded immediately during the
nondisruptive upgrade.
Note When selecting images during the upgrade, ASM-SFN and SSI are not supported on the Cisco MDS
9124 Switch and the Cisco MDS 9134 Multilayer Fabric Switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You must remove and reinsert or replace the supervisor module to bring it into service.
Caution Migrating your supervisor modules is a disruptive operation. When migration occurs from a
Supervisor 1 to a Supervisor 2 module, a cold switchover occurs and both modules are reloaded. When
the Supervisor 1 attempts to come up as the standby with the Supervisor 2 as the active supervisor, the
standby is not brought up.
For step-by-step instructions about migrating from Supervisor 1 modules to Supervisor 2 modules, refer
to the Cisco MDS 9000 Family NX-OS and SAN-OS Software Upgrade and Downgrade Guide.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
This error message is also generated if one of the following situations apply:
You remain at the loader> prompt for an extended period of time.
You do not set the boot variables appropriately.
Note The Cisco MDS 9513 Director does not support Supervisor-1 modules.
Generation 2 switching modules can be installed on all Cisco MDS 9000 Family switches, except
the Cisco MDS 9216 switch.
Generation 1 modules can be used with Cisco MDS 9000 Family switches. However, installing
Generation 1 modules in combination with Generation 2 switching modules in the same chassis
reduces the capabilities of the Generation 2 switching modules (see the Combining Generation 1,
Generation 2, and Generation 3 Modules section on page 22-24).
Generation 1 and Generation 2 switching modules can be installed on Cisco MDS 9500 Family
switches with either Supervisor-1 modules or Supervisor-2 modules.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Replacing Modules
When you replace any module (supervisor, switching, or services module), you must ensure that the new
module is running the same software version as the rest of the switch.
Refer to Cisco MDS 9000 Family SAN Volume Controller Configuration Guide for configuration details
on replacing the Caching Services Module (CSM).
Note When a spare standby supervisor module is inserted, it uses the same image as the active supervisor
module. The Cisco NX-OS software image is not automatically copied to the standby flash device.
Tip Use the Software Install Wizard to copy the Cisco NX-OS software image to the standby supervisor
bootflash device.
Using the Software Install Wizard after replacing any module, ensures the following actions:
The proper system and kickstart images are copied on the standby bootflash: file system.
The proper boot variables are set.
The loader and the BIOS are upgraded to the same version available on the active supervisor module.
To replace a module in any switch in the Cisco MDS 9200 Series or 9500 Series using Device Manager,
follow these steps:
Step 1 Create a backup of your existing configuration file, if required, by clicking Admin > Copy
Configuration and selecting runningConfig to startupConfig.
Step 2 Replace the required module as specified in the Cisco MDS 9200 Series Hardware Installation Guide or
the Cisco MDS 9500 Series Hardware Installation Guide.
Step 3 Verify that space is available on the standby supervisor bootflash by clicking Admin > Flash Files and
selecting the sup-standby. It is a good practice to remove older versions of Cisco MDS NX-OS images
and kickstart images.
Step 4 Use the Software Install Wizard to ensure that the new module is running the same software as the rest
of the switch.
Step 5 Wait until the new module is online and then ensure that the replacement was successful by clicking
Physical > Modules in Device Manager.
Default Settings
Table 15-5 lists the default image settings for all Cisco MDS 9000 Family switches.
Parameters Default
Kickstart image No image is specified.
System image No image is specified.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 16
Managing Configuration Files
This chapter describes how to initially configure switches using the configuration files so they can be
accessed by other devices. This chapter includes the following sections:
About Flash Devices, page 16-1
Formatting Flash Devices and File Systems, page 16-2
Using the File System, page 16-2
Downloading Configuration Files to the Switch, page 16-7
Figure 16-1 Flash Devices in the Cisco MDS 9000 Supervisor Module
Internal
bootflash
Internal
bootflash External
CompactFlash
Slot 0
120501
Cisco MDS 9200 Series Switch Cisco MDS 9500 Series Director
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 16-2 External CompactFlash in the Cisco MDS 9000 Supervisor Module
CompactFlash 1 CompactFlash 1
eject button slot 0
85603
CompactFlash 1
LED
Internal bootflash:
All switches in the Cisco MDS 9000 Family have one internal bootflash: that resides in the supervisor
or switching module.You have access to two locations within the internal bootflash: file system.
The volatile: file system provides temporary storage, and it is also the default location for file system
commands. Files in temporary storage (volatile:) are erased when the switch reboots.
The bootflash: (nonvolatile storage) file system provides permanent storage. The files in bootflash:
are preserved through reboots and power outages.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Flash Files
To list the files in a directory using Device Manager, follow these steps:
Step 2 Select the device and partition for the directory you want to view from the drop-down lists.
You see a list of files and directories.
Creating a Directory
To create a directory using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select the device and partition from the drop-down lists for the directory where you want to create the
directory.
Step 3 Click the Create Directory icon to create a directory.
You see the Create New Directory dialog box as shown in Figure 16-5.
Step 4 Enter the name of the new directory, and click OK.
You see the new directory in the directory listing.
Tip Any directory saved in the volatile: file system is erased when the switch reboots.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution If you specify a directory, the delete removes the entire directory and all of its contents.
Copying Files
To copy a file using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select the device and partition from the drop-down lists for the directory containing the file you want to
copy.
Step 3 Click Copy.
You see the Copy dialog box shown in Figure 16-8.
Step 4 Choose the protocol you want to use for the copy process: tftp, ftp, scp, or flashToFlash.
Step 5 Enter the address of the source server for a flash to flash copy only.
Step 6 Click the ... button to browse for the source file on your local PC or on the server, depending on the type
of copy.
Note If you are copying from flash, the filename must be in the format:
[device>:][<partition>:]<file>
Where device is a value obtained from FlashDeviceName, partition is a value obtained from
FlashPartitionName and file is the name of a file in flash.
Step 7 Enter the Switch Destination File name. (See the note in Step 6.)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select the location of the file you will copy from (serverFile, startupConfig, runningConfig).
Step 3 Select the location of the file you will copy to (serverFile, runningConfig, fabricStartupConfig).
Note You can copy a file fabric-wide using the fabricStartupConfig option, available in Cisco MDS
SAN-OS Release 2.1(1a) or later.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 Enter the user name and password you use to access the switch or server.
Step 8 Click Apply.
Note If any switch fails during this fabric-wide copy, that switch and the switch that you used to initiate this
process will keep the existing startup configuration. This does not affect the other switches in the fabric.
Step 2 Select the location of the file you want to back up (server file, startup configuration, or running
configuration).
Step 3 Select the destination of the file (server file, running configuration, fabric startup configuration).
Step 4 Enter the server address.
Step 5 Click the ... button to select the file name.
Step 6 Choose the file transfer protocol (tftp, ftp, or sftp).
Step 7 Enter the user name and password for the server you specified in Step 4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 17
Configuring High Availability
The Cisco MDS 9500 Series of multilayer directors support application restartability and nondisruptive
supervisor switchability. The switches are protected from system failure by redundant hardware
components and a high availability software framework.
This chapter includes the following sections:
About High Availability, page 17-1
Switchover Mechanisms, page 17-2
Switchover Guidelines, page 17-3
Process Restartability, page 17-3
Synchronizing Supervisor Modules, page 17-3
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
both supervisor modules come up at the same time, sup-1 becomes active. The standby supervisor
module constantly monitors the active supervisor module. If the active supervisor module fails, the
standby supervisor module takes over without any impact to user traffic.
Note For high availability, you need to connect the ethernet port for both active and standby
supervisors to the same network or virtual LAN. The active supervisor owns the one IP address
used by these ethernet connections. On a switchover, the newly activated supervisor takes over
this IP address.
Switchover Mechanisms
Switchovers occur by one of the following two mechanisms:
The active supervisor module fails and the standby supervisor module automatically takes over.
You manually initiate a switchover from an active supervisor module to a standby supervisor
module.
Once a switchover process has started another switchover process cannot be started on the same switch
until a stable standby supervisor module is available.
Caution If the standby supervisor module is not in a stable state (ha-standby), a switchover is not performed.
HA Switchover Characteristics
An HA switchover has the following characteristics:
It is stateful (nondisruptive) because control traffic is not impacted.
It does not disrupt data traffic because the switching modules are not impacted.
Switching modules are not reset.
Initiating a Switchover
To manually initiate a switchover from an active supervisor module to a standby supervisor module, reset
the active supervisor module using Device Manager. Once the switchover process has started, another
switchover process cannot be started on the same switch until a stable standby supervisor module is
available.
To perform a switchover using Device Manager, follow these steps:
Step 1 Ensure that an HA switchover is possible by selecting Physical > Modules to verify the presence of
multiple modules.
You see the screen shown in Figure 17-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select Admin > Reset Switch on the main Device Manager screen.
Switchover Guidelines
Be aware of the following guidelines when performing a switchover:
When you manually initiate a switchover, system messages indicate the presence of two supervisor
modules.
A switchover can only be performed when two supervisor modules are functioning in the switch.
The modules in the chassis are functioning as designed.
Process Restartability
Process restartability provides the high availability functionality in Cisco MDS 9000 Family switches.
It ensures that process-level failures do not cause system-level failures. It also restarts the failed
processes automatically. This vital process functions on infrastructure that is internal to the switch.
See the Displaying System Processes section on page 68-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The standby supervisor module automatically synchronizes its image with the running image on the
active supervisor module.
See the Replacing Modules section on page 15-17.
The following conditions identify when automatic synchronization is possible:
If the internal state of one supervisor module is Active with HA standby and the other supervisor
module is HA-standby, the switch is operationally HA and can do automatic synchronization.
If the internal state of one of the supervisor modules is none, the switch cannot do automatic
synchronization.
Table 17-1 lists the possible values for the redundancy states.
State Description
Not present The supervisor module is not present or is not plugged into the chassis.
Initializing The diagnostics have passed and the configuration is being downloaded.
Active The active supervisor module and the switch is ready to be configured.
Standby A switchover is possible.
Failed The switch detects a supervisor module failure on initialization and automatically
attempts to power-cycle the module three (3) times. After the third attempt it
continues to display a failed state.
Offline The supervisor module is intentionally shut down for debugging purposes.
At BIOS The switch has established connection with the supervisor and the supervisor
module is performing diagnostics.
Unknown The switch is in an invalid state. If it persists, call TAC.
Table 17-2 lists the possible values for the supervisor module states.
State Description
Active The active supervisor module in the switch is ready to be configured.
HA standby A switchover is possible.
Offline The switch is intentionally shut down for debugging purposes.
Unknown The switch is in an invalid state and requires a support call to TAC.
Table 17-3 lists the possible values for the internal redundancy states.
State Description
HA standby The HA switchover mechanism in the standby supervisor module is
enabled (see the HA Switchover Characteristics section on page 17-2).
Active with no standby A switchover is possible.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
State Description
Active with HA standby The active supervisor module in the switch is ready to be configured. The
standby module is in the HA-standby state.
Shutting down The switch is being shut down.
HA switchover in The switch is in the process of changing over to the HA switchover
progress mechanism.
Offline The switch is intentionally shut down for debugging purposes.
HA synchronization in The standby supervisor module is in the process of synchronizing its state
progress with the active supervisor modules.
Standby (failed) The standby supervisor module is not functioning.
Active with failed The active supervisor module and the second supervisor module is present
standby but is not functioning.
Other The switch is in a transient state. If it persists, call TAC.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 18
Managing System Hardware
This chapter provides details on how to manage system hardware other than services and switching
modules and how to monitor the health of the switch. It includes the following sections:
Displaying Switch Hardware Inventory, page 18-1
Running the CompactFlash Report, page 18-2
Displaying the Switch Serial Number, page 18-3
Displaying Power Usage Information, page 18-3
Power Supply Configuration Modes, page 18-4
About Crossbar Management, page 18-7
About Module Temperature, page 18-11
About Fan Modules, page 18-12
Default Settings, page 18-13
Step 1 In Fabric Manager, choose a fabric or switch in the Logical Domains pane, then expand Switches and
select Hardware in the Physical Attributes pane.
You see a list like the one shown in Figure 18-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see system attributes for multiple modules in Figure 18-1 and Figure 18-2. To see attributes for a
single switch in Device Manager, double click the graphic of the module in the main screen.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To run the CompactFlash report using Fabric Manager, follow these steps:
Note In the Flash Check Utility URL tftp:// field, you must enter the TFTP server location where
you saved the CompactFlash Check Utility.
Step 2 Deselect the check box for the switch(es) for which you do not want to run the CompactFlash report.
Step 3 Specify where you want the report file to be saved.
Step 4 Click OK to run the report.
Note A green indicator light showing Success: Finished check only indicates that the switch was
checked. You must examine the log file for CompactFlash status.
Step 5 If you see the message Error: Failed to copy plugin file, verify that the path you entered in the Flash
Check Utility URL tftp:// field is correct.
Step 6 If necessary, enter the correct location in the Flash Check Utility URL tftp:// field.
Step 7 Click OK to run the report again. Open the log file report for detailed information about CompactFlash
status.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note In a Cisco MDS 9500 Series switch, power usage is reserved for both supervisors whether one or both
supervisor modules are present.
Note The chassis in the Cisco MDS 9000 Family uses 1200 W when powered at 110 V, and 2500 W when
powered at 220 V.
Step 1 In the Fabric Manager Physical Attributes pane, expand Switches and then select Hardware. Click the
Power Supplies tab.
You see the power supply information screen shown in Figure 18-3.
Low TotalAvailable (< 200.0W) values for non-2-slot chassis are highlighted in yellow, as inserting a
new card into the switch requires power around 180 W.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note See the Displaying Power Usage Information section on page 18-3 to view the current power supply
configuration.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
b. Combined modeThe total power is twice the lesser of the two power supply capacities.
For example, suppose you have the following usage figures configured:
Power supply 1 = 2500 W
Additional Power supply 2 = not used
Current Usage = 2000 W
Current capacity = 2500 W
Then the following three scenarios will differ as specified (see Table 18-2):
Scenario 1: If 1800 W is added as power supply 2, then the capacity increases to 3600 W.
Reason: 3600 W is twice the minimum (1800 W).
Scenario 2: If 2200 W is added as power supply 2, then the current capacity increases to
4400 W.
Reason: 4400 W is twice the minimum (2200 W).
Scenario 3: If 3000 W is added as power supply 2, then the current capacity increases to
5000 W.
Reason: 5000 W is twice the minimum (2500 W).
2. When you change the configuration from combined to redundant mode and the system detects a
power supply that has a capacity lower than the current usage, the power supply is shut down. If both
power supplies have a lower capacity than the current system usage, the configuration is not allowed.
Several configuration scenarios are summarized in Table 18-3.
Scenario 1: You have the following usage figures configured:
Power supply 1 = 2500 W
Additional Power supply 2 = 1800 W
Current Usage = 2000 W
Current mode = combined mode (so current capacity is 3600 W)
You decide to change the switch to redundant mode. Then power supply 2 is shut down.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Reason: 1800 W is the lesser of the two power supplies and it is less than the system usage.
Scenario 2: You have the following usage figures configured:
Power supply 1 = 2500 W
Additional Power supply 2 = 2200 W
Current Usage = 2000 W
Current mode = combined mode (so current capacity is 4400 W).
You decide to change the switch to redundant mode. Then the current capacity decreases to
2200 W.
Reason: 2200 W is the lesser of the two power supplies.
Scenario 3: You have the following usage figures configured:
Power supply 1 = 2500 W
Additional Power supply 2 = 1800 W
Current Usage = 3000 W
Current mode = combined mode (so current capacity is 3600 W).
You decide to change the switch to redundant mode. Then the current capacity decreases to
2500 W and the configuration is rejected.
Reason: 2500 W is less than the system usage (3000 W).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The new software features in Cisco MDS NX-OS Release 4.1(1b) and later will not be supported in the
Generation 1 hardware.
Note Cisco MDS NX-OS Release 4.1(1b) and later does not support the following hardware: Supervisor-1
module, the IPS-4 and IPS-8 storage modules, the MDS 9216 switch, the MDS 9216A switch, the MDS
9020 switch, the MDS 9120 switch, and the MDS 9140 switch.
Cisco MDS SAN-OS Release 3.0(1) and later supports two types of hardware for the Cisco MDS 9500
Series Directors: Generation 1 and Generation 2.
Generation 2 consists of all new hardware supported by Cisco SAN-OS Release 3.0(1) and later,
including the following:
Cisco MDS 9513 Director chassis
Supervisor-2 module
MSM-18/4 Multiservice Storage module
MDS 9222i Module-1 module
48-port 4-Gbps Fibre Channel switching module
24-port 4-Gbps Fibre Channel switching module
12-port 4-Gbps Fibre Channel switching module
4-port 10-Gbps Fibre Channel switching module
The Cisco MDS 9500 Series Directors running Cisco MDS SAN-OS 3.0(1) or later support the following
types of crossbars:
Integrated crossbarLocated on the Supervisor-1 and Supervisor-2 modules. The Cisco MDS 9506
and 9509 Directors only use integrated crossbars.
External crossbarLocated on an external crossbar switching module. Cisco MDS 9513 Directors
require external crossbar modules.
Generation 1 consists of all hardware supported by Cisco SAN-OS earlier to Release 3.0(1), including
the following:
Cisco MDS 9506 and 9509 Director chassis
Supervisor-1 module
32-port 2-Gbps Fibre Channel switching module
16-port 2-Gbps Fibre Channel switching module
8-port IP Storage Services (IPS-8) module
4-port IP Storage Services (IPS-4) module
Storage Services Module (SSM)
14/2-port Multiprotocol Services (MPS-14/2) module
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Right-click the supervisor module. Crossbars are indicated with a green X (see Figure 18-5).
You see the context menu for the supervisor module.
Step 2 Select Out of Service to gracefully shut down the integrated crossbar.
Note To reactivate the integrated crossbar, you must remove and reinsert or replace the Supervisor-1
or Supervisor-2 module.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Taking the crossbar out of service may cause a supervisor switchover.
To perform a graceful shutdown of integrated crossbars on the supervisor module in a Cisco MDS 9509
or 9506 Director using Device Manager, follow these steps:
Note To reactivate the integrated crossbar module, you must remove and reinsert or replace the
crossbar module.
Caution Taking the crossbar out of service may cause a supervisor switchover.
Note Supervisor-2 module switchovers do not occur when removing crossbar switch modules on a Cisco MDS
9513 that only has Generation 2 modules installed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note A threshold value of -127 indicates that no thresholds are configured or applicable.
Minor thresholdWhen a minor threshold is exceeded, a minor alarm occurs and the following
action is taken for all four sensors:
System messages are displayed.
Call Home alerts are sent (if configured).
SNMP notifications are sent (if configured).
Major thresholdWhen a major threshold is exceeded, a major alarm occurs and the following
action is taken:
For sensors 1, 3, and 4 (outlet and onboard sensors):
System messages are displayed.
Call Home alerts are sent (if configured).
SNMP notifications are sent (if configured).
For sensor 2 (intake sensor):
If the threshold is exceeded in a switching module, only that module is shut down.
If the threshold is exceeded in an active supervisor module with HA-standby or standby present,
only that supervisor module is shut down and the standby supervisor module takes over.
If you do not have a standby supervisor module in your switch, you have an interval of 2 minutes
to decrease the temperature. During this interval the software monitors the temperature every
five (5) seconds and continuously sends system messages as configured.
Tip To realize the benefits of these built-in automatic sensors on any switch in the Cisco MDS 9500
Series, we highly recommend that you install dual supervisor modules. If you are using a Cisco
MDS 9000 Family switch without dual supervisor modules, we recommend that you
immediately replace the fan module if even one fan is not working.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip If one or more fans fail within a fan module, the Fan Status LED turns red. A fan failure could lead to
temperature alarms if not corrected immediately.
The fan status is continuously monitored by the Cisco MDS NX-OS software. In case of a fan failure,
the following action is taken:
System messages are displayed.
Call Home alerts are sent (if configured).
SNMP notifications are sent (if configured).
To display the fan module status, from Device Manager, choose Physical > Fans. The dialog box
displays the fan status.
The possible Status field values for a fan module on the Cisco MDS 9500 Series switches are as follows:
If the fan module is operating properly, the status is ok.
If the fan is physically absent, the status is absent.
If the fan is physically present but not working properly, the status is failure.
On the Cisco MDS 9513 Director, the front fan module has 15 fans.
Figure 18-6 shows the numbering of the fans in the front fan module on the Cisco MDS 9513 Director.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
3
2
1 6
5
4 9
8
7 12
11
10 15
14
13
144744
The rear fan module (DS-13SLT-FAN-R) on the Cisco MDS 9513 Director has only two fans.
Default Settings
Table 18-4 lists the default hardware settings.
Parameters Default
Power supply mode Redundant mode.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 19
Managing Modules
This chapter describes how to manage switching and services modules (also known as line cards) and
provides information on monitoring module states.
This chapter includes the following sections:
About Modules, page 19-1
Verifying the Status of a Module, page 19-3
Obtaining Supervisor Module Statistics, page 19-4
Checking the State of a Module, page 19-4
Reloading Modules, page 19-5
Preserving the Module Configuration, page 19-7
Powering Off Switching Modules, page 19-8
Identifying Module LEDs, page 19-9
Default Settings, page 19-13
About Modules
Table 19-1 describes the supervisor module options for switches in the Cisco MDS 9000 Family.
Number of Supervisor
Supervisor Module Slot Switching and Services Module
Product Modules Number Features
Cisco MDS 9513 Two modules 7 and 8 13-slot chassis allows any switching or
services module in the other eleven
slots.
Cisco MDS 9509 Two modules 5 and 6 9-slot chassis allows any switching or
services module in the other seven
slots.
Cisco MDS 9506 Two modules 5 and 6 6-slot chassis allows any switching or
services module in the other four slots.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Number of Supervisor
Supervisor Module Slot Switching and Services Module
Product Modules Number Features
Cisco MDS 9216 One module 1 2-slot chassis allows one optional
switching or services module in the
other slot.
Cisco MDS 9216A One module 1 2-slot chassis allows one optional
switching or services module in the
other slot.
Cisco MDS 9216i One module 1 2-slot chassis allows one optional
switching or services module in the
other slot.
Supervisor Modules
Supervisor modules are automatically powered up and started with the switch.
Cisco MDS 9513 Directors have two supervisor modulesone in slot 7 (sup-1) and one in slot 8
(sup-2). See Table 19-2. When the switch powers up and both supervisor modules come up together,
the active module is the one that comes up first. The standby module constantly monitors the active
module. If the active module fails, the standby module takes over without any impact to user traffic.
Cisco MDS 9506 and Cisco MDS 9509 switches have two supervisor modulesone in slot 5 (sup-1)
and one in slot 6 (sup-2). See Table 19-2. When the switch powers up and both supervisor modules
come up together, the active module is the one that comes up first. The standby module constantly
monitors the active module. If the active module fails, the standby module takes over without any
impact to user traffic.
Cisco MDS 9216i switches have one supervisor module that includes an integrated switching
module with 14 Fibre Channel ports and two Gigabit Ethernet ports.
Cisco MDS 9200 Series switches have one supervisor module that includes an integrated 16-port
switching module.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switching Modules
Cisco MDS 9000 Family switches support any switching module in any non-supervisor slot. These
modules obtain their image from the supervisor module.
Services Modules
Cisco MDS 9000 Family switches support any services module in any non-supervisor slot.
Refer to the Cisco MDS 9000 Family SAN Volume Controller Configuration Guide for more information
on CSMs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The Status column in the output should display an ok status for switching modules and an active or
standby (or HA-standby) status for supervisor modules. If the status is either ok or active, you can
continue with your configuration.
Note A standby supervisor module reflects the HA-standby status if the HA switchover mechanism is enabled
(see the HA Switchover Characteristics section on page 17-2). If the warm switchover mechanism is
enabled, the standby supervisor module reflects the standby status.
The states through which a switching module progresses is discussed in the Checking the State of a
Module section on page 19-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Module Status
Output Description
powered up The hardware has electrical power. When the hardware is powered up, the
software begins booting.
testing The switching module has established connection with the supervisor
module and the switching module is performing bootup diagnostics.
initializing The diagnostics have completed successfully and the configuration is being
downloaded.
failure The switch detects a switching module failure upon initialization and
automatically attempts to power-cycle the module three times. After the third
attempt it continues to display a failed state.
ok The switch is ready to be configured.
power-denied The switch detects insufficient power for a switching module to power up.
active This module is the active supervisor module and the switch is ready to be
configured.
HA-standby The HA switchover mechanism is enabled on the standby supervisor module
(see the HA Switchover Characteristics section on page 17-2).
standby The warm switchover mechanism is enabled on the standby supervisor
module (see the HA Switchover Characteristics section on page 17-2).
To view the state of a module from Device Manager, choose Physical > Modules. The dialog box
displays the status of every module.
This example shows the output of the dir bootflash: command:
root 14502912 Jan 13 12:23:52 1980 kickstart_image1
admin 14424576 Jan 14 06:47:29 1980 kickstart_image2
admin 14469632 Jan 14 01:29:16 1980 kickstart_image3
root 14490112 Jan 08 07:25:50 1980 kickstart_image4
root 12288 Jan 16 15:49:24 1980 lost+found/
admin 14466048 Jan 14 02:40:16 1980 kickstart_image5
admin 24206675 Jan 14 02:57:03 1980 m9500-sf1ek.bin
root 19084510 Jan 13 12:23:28 1980 system_image1
admin 19066505 Jan 14 06:45:16 1980 system_image2
admin 18960567 Jan 14 01:25:21 1980 system_image5
Reloading Modules
You can reload the entire switch, reset specific modules in the switch, or reload the image on specific
modules in the switch.
This section includes the following topics:
Reloading a Switch, page 19-6
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Reloading a Switch
To reload a switch using Fabric Manager, follow these steps:
Step 4 Check the Reset check box in the row of the switch to reload.
Step 5 Click the Apply Changes icon.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Check the Reset check box in the row for the module(s) you want to reset.
Step 5 Click the Apply Changes icon.
Step 3 Click individual Select check boxes for switch configurations to copy.
Step 4 In the From column, ensure that runningConfig is selected.
Step 5 In the To column, ensure that startupConfig is selected.
Step 6 Click the Apply Changes icon.
Table 19-4 displays various scenarios when module configurations are preserved or lost.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Scenario Consequence
A particular switching module is removed and the copy The configured module information is lost.
running-config startup-config command is issued again.
A particular switching module is removed and the same The configured module information is
switching module is replaced before the copy preserved.
running-config startup-config command is issued again.
A particular switching module is removed and replaced The configured module information is
with the same type switching module, and a reload preserved.
module number command is issued.
A particular switching module is reloaded when a reload The configured module information is
module number command is issued. preserved.
A particular switching module is removed and replaced The configured module information is lost
with a different type of switching module. For example, a from the running configuration. The
16-port switching module is replaced with a 32-port default configuration is applied.
switching module.
The configured module information
remains in startup configuration until a
copy running-config startup-config
command is issued again.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 19-5 LEDs for the Cisco MDS 9200 Series Supervisor Modules
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 19-6 describes the LEDs for the Cisco MDS 9200 Series interface module.
Table 19-6 LEDs on the Cisco MDS 9200 Series Interface Module
Table 19-7 describes the LEDs for the 16-port and 32-port switching modules, and the 4-port, 12-port,
24-port, and 48-port Generation 2 switching modules.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 19-7 LEDs for the Cisco MDS 9000 Family Fibre Channel Switching Modules
The LEDs on the supervisor module indicate the status of the supervisor module, power supplies, and
the fan module. Table 19-8 provides more information about these LEDs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 19-8 LEDs for the Cisco MDS 9500 Series Supervisor Modules
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 19-9 lists the default settings for the supervisor module.
Parameters Default
Administrative connection Serial connection.
Global switch information No value for system name.
No value for system contact.
No value for location.
System clock No value for system clock time.
In-band (VSAN 1) interface IP address, subnet mask, and broadcast address assigned to the
VSAN are set to 0.0.0.0.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
Initial state when installed Power-down state on switches with Cisco MDS SAN-OS
Release 2.1(1a) and earlier installed.
Fibre Channel switching mode on switches with Cisco MDS
SAN-OS Release 2.1(2) and NX-OS Release 4.1(1b), or later
installed and SSMs with EPLD version 2.0 (2) and later
installed.
PA R T 3
Switch Configuration
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 20
Configuring Interfaces
The main function of a switch is to relay frames from one data link to another. To relay the frames, the
characteristics of the interfaces through which the frames are received and sent must be defined. The
configured interfaces can be Fibre Channel interfaces, Gigabit Ethernet interfaces, the management
interface (mgmt0), or VSAN interfaces.
This chapter describes the basic interface configuration to get your switch up and running. It includes
the following sections:
Common Interface Configuration, page 20-1
Fibre Channel Interfaces, page 20-2
TL Ports for Private Loops, page 20-23
Buffer Credits, page 20-26
Management Interfaces, page 20-29
VSAN Interfaces, page 20-30
Default Settings, page 20-32
See Chapter 12, Initial Configuration, and Chapter 51, Configuring IP Services, for more
information on configuring mgmt0 interfaces.
See Chapter 53, Configuring IPv4 for Gigabit Ethernet Interfaces and Chapter 54, Configuring IPv6
for Gigabit Ethernet Interfacesfor more information on configuring Gigabit Ethernet interfaces.
Tip Before you begin configuring the switch, ensure that the modules in the chassis are functioning as
designed. See the Verifying the Module Status section on page 12-2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
When configuring these host-optimized ports, the following port mode guidelines apply:
You can configure only the first port in each 4-port group (for example, the first port in ports 1-4,
the fifth port in ports 5-8 and so on) as an E port. If the first port in the group is configured as an E
port, the other three ports in each group (ports 2-4, 6-8 and so on) are not usable and remain
shutdown.
If you execute the write erase command on a 32-port switching module, and then copy a saved
configuration to the switch from a text file that contains the no system default switchport
shutdown command, you need to copy the text file to the switch again for the E ports to come up
without manual configuration.
If any of the other three ports are enabled, you cannot configure the first port as an E port. The other
three ports continue to remain enabled.
The auto mode is not allowed in a 32-port switching module or the host-optimized ports in the Cisco
9100 Series (16 host-optimized ports in the Cisco MDS 9120 switch and 32 host-optimized ports in
the Cisco MDS 9140 switch).
The default port mode is Fx (Fx negotiates to F or FL) for 32-port switching modules.
The 32-port switching module does not support FICON.
Note We recommend that you configure your E ports on a 16-port switching module. If you must configure
an E port on a 32-port host-optimized switching module, the other three ports in that 4-port group cannot
be used.
Note In the Cisco MDS 9100 Series, the groups of ports that are located on the left and outlined in white are
full line rate. The other ports are host-optimized. Each group of 4 host-optimized ports have the same
features as for the 32-port switching module.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Interfaces are created in VSAN 1 by default. See Chapter 26, Configuring and Managing VSANs.
Note When a module is removed and replaced with the same type of module, the configuration is retained. If
a different type of module is inserted, then the original configuration is no longer retained.
E Port
In expansion port (E port) mode, an interface functions as a fabric expansion port. This port may be
connected to another E port to create an Inter-Switch Link (ISL) between two switches. E ports carry
frames between switches for configuration and fabric management. They serve as a conduit between
switches for frames destined to remote N ports and NL ports. E ports support class 2, class 3, and class
F service.
An E port connected to another switch may also be configured to form a PortChannel (see Chapter 23,
Configuring PortChannels).
Note We recommend that you configure E ports on 16-port modules. If you must configure an E port on a
32-port oversubscribed module, then you can only use the first port in a group of four ports (for example,
ports 1 through 4, 5 through 8, and so forth). The other three ports cannot be used.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
F Port
In fabric port (F port) mode, an interface functions as a fabric port. This port may be connected to a
peripheral device (host or disk) operating as an N port. An F port can be attached to only one N port. F
ports support class 2 and class 3 service.
FL Port
In fabric loop port (FL port) mode, an interface functions as a fabric loop port. This port may be
connected to one or more NL ports (including FL ports in other switches) to form a public arbitrated
loop. If more than one FL port is detected on the arbitrated loop during initialization, only one FL port
becomes operational and the other FL ports enter nonparticipating mode. FL ports support class 2 and
class 3 service.
Note FL port mode is not supported on 4-port 10-Gbps switching module interfaces.
NP Ports
An NP port is a port on a device that is in NPV mode and connected to the core switch via an F port. NP
ports behave like N ports except that in addition to providing N port behavior, they also function as
proxies for multiple, physical N ports.
For more details about NP ports and NPV, see Chapter 21, Configuring N Port Virtualization.
TL Port
In translative loop port (TL port) mode, an interface functions as a translative loop port. It may be
connected to one or more private loop devices (NL ports). TL ports are specific to Cisco MDS 9000
Family switches and have similar properties as FL ports. TL ports enable communication between a
private loop device and one of the following devices:
A device attached to any switch on the fabric
A device on a public loop anywhere in the fabric
A device on a different private loop anywhere in the fabric
A device on the same private loop
TL ports support class 2 and class 3 services.
Private loop devices refer to legacy devices that reside on arbitrated loops. These devices are not aware
of a switch fabric because they only communicate with devices on the same physical loop (see the
About TL Port ALPA Caches section on page 20-25).
Tip We recommend configuring devices attached to TL ports in zones that have up to 64 zone members.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
TE Port
In trunking E port (TE port) mode, an interface functions as a trunking expansion port. It may be
connected to another TE port to create an extended ISL (EISL) between two switches. TE ports are
specific to Cisco MDS 9000 Family switches. They expand the functionality of E ports to support the
following:
VSAN trunking
Transport quality of service (QoS) parameters
Fibre Channel trace (fctrace) feature
In TE port mode, all frames are transmitted in EISL frame format, which contains VSAN information.
Interconnected switches use the VSAN ID to multiplex traffic from one or more VSANs across the same
physical link. This feature is referred to as trunking in the Cisco MDS 9000 Family (see Chapter 24,
Configuring Trunking). TE ports support class 2, class 3, and class F service.
TF Port
In trunking F port (TF port) mode, an interface functions as a trunking expansion port. It may be
connected to another trunked N port (TN port) or trunked NP port (TNP port) to create a link between a
core switch and an NPV switch or an HBA to carry tagged frames. TF ports are specific to Cisco MDS
9000 Family switches. They expand the functionality of F ports to support VSAN trunking.
In TF port mode, all frames are transmitted in EISL frame format, which contains VSAN information.
Interconnected switches use the VSAN ID to multiplex traffic from one or more VSANs across the same
physical link. This feature is referred to as trunking in the Cisco MDS 9000 Family (see Chapter 24,
Configuring Trunking). TF ports support class 2, class 3, and class F service.
TNP Port
In trunking NP port (TNP port) mode, an interface functions as a trunking expansion port. It may be
connected to a trunked F port (TF port) to create a link to a core NPIV switch from an NPV switch to
carry tagged frames.
SD Port
In SPAN destination port (SD port) mode, an interface functions as a switched port analyzer (SPAN).
The SPAN feature is specific to switches in the Cisco MDS 9000 Family. It monitors network traffic that
passes though a Fibre Channel interface. This monitoring is done using a standard Fibre Channel
analyzer (or a similar switch probe) that is attached to an SD port. SD ports do not receive frames, they
merely transmit a copy of the source traffic. The SPAN feature is nonintrusive and does not affect
switching of network traffic for any SPAN source ports (see Chapter 60, Monitoring Network Traffic
Using SPAN).
ST Port
In the SPAN tunnel port (ST port) mode, an interface functions as an entry point port in the source switch
for the RSPAN Fibre Channel tunnel. The ST port mode and the remote SPAN (RSPAN) feature are
specific to switches in the Cisco MDS 9000 Family. When configured in ST port mode, the interface
cannot be attached to any device, and thus cannot be used for normal Fibre Channel traffic (see the
Configuring SPAN section on page 60-6).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note ST port mode is not supported on the Cisco MDS 9124 Fabric Switch, the Cisco Fabric Switch for HP
c-Class BladeSystem, and the Cisco Fabric Switch for IBM BladeCenter.
Fx Port
Interfaces configured as Fx ports can operate in either F port or FL port mode. The Fx port mode is
determined during interface initialization depending on the attached N port or NL port. This
administrative configuration disallows interfaces to operate in any other modefor example, preventing
an interface to connect to another switch.
B Port
While E ports typically interconnect Fibre Channel switches, some SAN extender devices, such as the
Cisco PA-FC-1G Fibre Channel port adapter, implement a bridge port (B port) model to connect
geographically dispersed fabrics. This model uses B ports as described in the T11 Standard FC-BB-2.
Figure 52-1 on page 52-2 depicts a typical SAN extension over an IP network.
If an FCIP peer is a SAN extender device that only supports Fibre Channel B ports, you need to enable
the B port mode for the FCIP link. When a B port is enabled, the E port functionality is also enabled and
they coexist. If the B port is disabled, the E port functionality remains enabled (see Chapter 52,
Configuring IP Storage).
Auto Mode
Interfaces configured in auto mode can operate in one of the following modes: F port, FL port, E port,
TE port, or TF port. The port mode is determined during interface initialization. For example, if the
interface is connected to a node (host or disk), it operates in F port or FL port mode depending on the N
port or NL port mode. If the interface is attached to a third-party switch, it operates in E port mode. If
the interface is attached to another switch in the Cisco MDS 9000 Family, it may become operational in
TE port mode (see Chapter 24, Configuring Trunking).
TL ports and SD ports are not determined during initialization and are administratively configured.
Note Fibre Channel interfaces on Storage Services Modules (SSMs) cannot be configured in auto mode.
Administrative States
The administrative state refers to the administrative configuration of the interface as described in
Table 20-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Operational States
The operational state indicates the current operational state of the interface as described in Table 20-2.
Reason Codes
Reason codes are dependent on the operational state of the interface as described in Table 20-3.
Administrative Operational
Configuration Status Reason Code
Up Up None.
Down Down Administratively downIf you administratively configure an interface
as down, you disable the interface. No traffic is received or transmitted.
Up Down See Table 20-4.
Note Only some of the reason codes are listed in Table 20-4.
If the administrative state is up and the operational state is down, the reason code differs based on the
nonoperational reason code as described in Table 20-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Applicable
Reason Code (long version) Description Modes
Link failure or not connected The physical layer link is not operational. All
SFP not present The small form-factor pluggable (SFP) hardware is not
plugged in.
Initializing The physical layer link is operational and the protocol
initialization is in progress.
Reconfigure fabric in progress The fabric is currently being reconfigured.
Offline The Cisco NX-OS software waits for the specified
R_A_TOV time before retrying initialization.
Inactive The interface VSAN is deleted or is in a suspended
state.
To make the interface operational, assign that port to a
configured and active VSAN.
Hardware failure A hardware failure is detected.
Error disabled Error conditions require administrative attention.
Interfaces may be error-disabled for various reasons.
For example:
Configuration failure.
Incompatible buffer-to-buffer credit configuration.
To make the interface operational, you must first fix the
error conditions causing this state; and next,
administratively shut down or enable the interface.
FC redirect failure A port is isolated because a Fibre Channel redirect is
unable to program routes.
No port activation license A port is not active because it does not have a port
available license.
SDM failure A port is isolated because SDM is unable to program
routes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Applicable
Reason Code (long version) Description Modes
Isolation due to ELP failure The port negotiation failed. Only E ports
Isolation due to ESC failure The port negotiation failed. and TE ports
For the Cisco Fabric Switch for HP c-Class BladeSystem and the Cisco Fabric Switch for IBM
BladeCenter, you can configure a range of interfaces among internal ports or external ports, but you
cannot mix both interface types within the same range. For example, bay 1-10, bay 12 or ext 0, ext
15-18 are valid ranges, but bay 1-5, ext 15-17 is not.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Graceful Shutdown
Interfaces on a port are shut down by default (unless you modified the initial configuration).
The Cisco NX-OS software implicitly performs a graceful shutdown in response to either of the
following actions for interfaces operating in the E port mode:
If you shut down an interface.
If a Cisco NX-OS software application executes a port shutdown as part of its function.
A graceful shutdown ensures that no frames are lost when the interface is shutting down. When a
shutdown is triggered either by you or the Cisco NX-OS software, the switches connected to the
shutdown link coordinate with each other to ensure that all frames in the ports are safely sent through
the link before shutting down. This enhancement reduces the chance of frame loss.
A graceful shutdown is not possible in the following situations:
If you physically remove the port from the switch.
If in-order-delivery (IOD) is enabled (see In-Order Delivery section on page 32-15).
If the Min_LS_interval interval is higher than 10 seconds ().
Note This feature is only triggered if both switches at either end of this E port interface are MDS switches and
are running Cisco SAN-OS Release 2.0(1b) or later, or MDS NX-OS Release 4.1(1a) or later.
Step 1 Either expand Switches > Interfaces and then select Gigabit Ethernet or expand Switches > Interfaces
and then select FC Physical. You see the interface configuration in the Information pane.
Step 2 Click the General tab.
Step 3 Click Admin.
You see the drop-down box shown in Figure 20-3.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 (Optional) Set other configuration parameters using the other tabs.
Step 6 Click Apply Changes.
Note To ensure that ports that are part of ISLs do not get changed to port mode F, configure the ports in port
mode E, rather than in Auto mode.
To configure the interface mode using Fabric Manager, follow these steps:
To configure administrative speed of the interface using Fabric Manager, follow these steps:
For internal ports on the Cisco Fabric Switch for HP c_Class BladeSystem and Cisco Fabric Switch for
IBM BladeCenter, a port speed of 1 Gbps is not supported. Auto-negotiation is supported between 2
Gbps and 4 Gbps only. Also, if the BladeCenter is a T chassis, then port speeds are fixed at 2 Gbps and
auto-negotiation is not enabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Autosensing
Autosensing speed is enabled on all 4-Gbps and 8-Gbps switching module interfaces by default. This
configuration enables the interfaces to operate at speeds of 1 Gbps, 2 Gbps, or 4 Gbps on the 4-Gbps
switching modules, and 8-Gbps on the 8-Gbps switching modules. When autosensing is enabled for an
interface operating in dedicated rate mode, 4-Gbps of bandwidth is reserved, even if the port negotiates
at an operating speed of 1-Gbps or 2-Gbps.
To avoid wasting unused bandwidth on 48-port and 24-port 4-Gbps and 8-Gbps Fibre Channel switching
modules, you can specify that only 2 Gbps of required bandwidth be reserved, not the default of 4 Gbps
or 8-Gbps. This feature shares the unused bandwidth within the port group provided that it does not
exceed the rate limit configuration for the port. You can also use this feature for shared rate ports that
are configured for autosensing.
Tip When migrating a host that supports up to 2-Gbps traffic (that is, not 4-Gbps with autosensing
capabilities) to the 4-Gbps switching modules, use autosensing with a maximum bandwidth of 2-Gbps.
When migrating a host that supports up to 4-Gbps traffic (that is, not 8-Gbps with autosensing
capabilities) to the 8-Gbps switching modules, use autosensing with a maximum bandwidth of 4-Gbps.
Note The port guard and port owner features are available for all ports irrespective of the operational mode.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To specify or remove the port owner using the Fabric Manager, follow these steps:
Step 3 In the Owner text box, enter a port owner and the purpose for which port is used.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To specify or remove the port owner using the Device Manager, follow these steps:
Step 3 In the Owner text box, enter a port owner and the purpose for which the port is used.
Step 4 Click Apply.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Even if the link does not flap due to failure of the link, and port guard is not enabled, the port goes into
a down state if too many invalid FLOGI requests are received from the same host.
To enable port guard using the Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the Port Guard tab and then select the port (see Figure 20-6).
To enable port guard for multiple interfaces using the Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 (Optional) Enter the Duration in seconds and NumFlaps. If the values are 0, the port goes into a down
state even if the link flaps once. Otherwise, the link goes into a down state if the link flaps for the
NumFlaps times within the Duration (in seconds).
Step 5 Click Apply to activate the configuration.
To enable port guard for a single interface using the Device Manager, follow these steps:
Step 1 Right-click the interface in the module panel, and then choose Configure from the menu.
You see the Interface configuration window.
Step 2 Click the Port Guard tab (see Figure 20-8).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 (Optional) Set other configuration parameters using the other tabs.
Step 4 Click Apply Changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
77686
1 3 4
Note Generation 2 and Generation 3 modules and Frabic Switches do not have speed LEDs.
Step 1 Expand Switches > Interfaces and then select Gigabit Ethernet.
You see the interface configuration in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Enable the Beacon Mode option for the selected switch.
Step 3 Click Apply Changes.
Note The flashing green light turns on automatically when an external loopback is detected that causes the
interfaces to be isolated. The flashing green light overrides the beacon mode configuration. The state of
the LED is restored to reflect the beacon mode configuration after the external loopback is removed.
Note Regardless of disabling the switch port ignore bit-error threshold for an interface, the switch generates
a syslog message when bit error threshold events are detected.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Definition Acronym
Standard transmitters defined in the GBIC specifications
short wavelaser swl
long wavelaser lwl
long wavelaser cost reduced lwcr
electrical elec
Extended transmitters assigned to Cisco-supported SFPs
CWDM-1470 c1470
CWDM-1490 c1490
CWDM-1510 c1510
CWDM-1530 c1530
CWDM-1550 c1550
CWDM-1570 c1570
CWDM-1590 c1590
CWDM-1610 c1610
Step 1 Expand Switches > Interfaces and then select FC Physical. You see the interface configuration in the
Information pane.
Step 2 Click the Physical tab to see the transmitter type for the selected interface.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note In Fabric Manager, you can collect interface statistics by expanding Switches > ISLs and selecting
Statistics from the Physical Attributes pane.
To gather and display interface counters using Device Manager, follow these steps:
Step 4 (Optional) Click the Pencil icon to reset the cumulative counters.
Step 5 (Optional) Click the Save icon to save the gathered statistics to a file or select the Print icon to print the
statistics.
Step 6 Click Close when you are finished gathering and displaying statistics.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
About TL Ports
TL port mode is not supported on the following:
Generation 2 switching module interfaces
Cisco MDS 9124 Fabric Switch
Cisco Fabric Switch for HP c-Class BladeSystem
Cisco Fabric Switch for IBM BladeCenter
Private loop devices refer to legacy devices that reside on arbitrated loops. These devices are not aware
of a switch fabric because they only communicate with devices on the same physical loop.
The legacy devices are used in Fibre Channel networks and devices outside the loop may need to
communicate with them. The communication functionality is provided through TL ports. See the About
Interface Modes section on page 20-3.
Follow these guidelines when configuring private loops:
A maximum of 64 fabric devices can be proxied to a private loop.
Fabric devices must be in the same zone as private loop devices to be proxied to the private loop.
Each private device on a TL port may be included in a different zone.
All devices on the loop are treated as private loops. You cannot mix private and public devices on
the loop if the configured port mode is TL.
The only FC4-type supported by TL ports is SCSI (FCP).
Communication between a private initiator to a private target on the same private loop does not
invoke TL port services.
Table 20-6 lists the TL port translations supported in Cisco MDS 9000 Family switches. Figure 20-12
shows examples of TL port translation support.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Private
initiator (I1)
Public
target (T2)
NL port
Private
initiator (I4) Private
loop
N port
Private
target (T1) Public
NL port F port initiator (I2)
TL port
NL port Private TL port N port
loop F port
FL port
Public
NL port Public
target (3) loop
NL port
91699
Public
initiator (I3)
Configuring TL Ports
To configure the TL interface mode using Fabric Manager, follow these steps:
Step 1 Expand Switches > Interfaces and then select FC Physical. You see the interface configuration in the
Information pane.
Step 2 Click the General tab and click Mode Admin.
Step 3 Set the Mode Admin drop-down menu to TL.
Step 4 (Optional) Set other configuration parameters using the other tabs.
Step 5 Click Apply Changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
A cache contains entries for recently allocated ALPA values. These caches are maintained on various TL
ports. If a device already has an ALPA, the Cisco NX-OS software attempts to allocate the same ALPA
to the device each time. The ALPA cache is maintained in persistent storage and saves information across
switch reboots. The maximum cache size is 1000 entries. If the cache is full, and a new ALPA is
allocated, the Cisco NX-OS software discards an inactive cache entry (if available) to make space for
the new entry. See the TL Port section on page 20-5 for more information on TL ports.
Refer to the Cisco MDS 9000 Family CLI Configuration Guide to manage the TL Port ALPA cache.
Buffer Credits
Fibre Channel interfaces use buffer credits to ensure all packets are delivered to their destination. This
section describes the different buffer credits available on the Cisco MDS Family switches and includes
the following topics:
About Buffer-to-Buffer Credits, page 20-26
Configuring Buffer-to-Buffer Credits, page 20-26
About Performance Buffers, page 20-27
Configuring Performance Buffers, page 20-27
About Extended BB_credits, page 20-28
Configuring Extended BB_credits, page 20-29
Note In the Cisco MDS 9100 Series, the groups of ports on the left outlined in white are full line rate. The
other ports are host-optimized. Each group of 4 host-optimized ports have the same features as for the
32-port switching module.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Interfaces and then select FC Physical. You see the interface configuration in the
Information pane.
Step 2 Click the Bb Credit tab.
You see the buffer credits.
Step 3 Set any of the buffer-to-buffer credits for an interface.
Step 4 Click Apply Changes.
This example shows the output of the do show int fc1/1 command:
intfc1/1 is up
...
16 receive B2B credit remaining
3 transmit B2B credit remaining
Note Performance buffers are not supported on the Cisco MDS 9124 Fabric Switch, the Cisco Fabric Switch
for HP c-Class BladeSystem, and the Cisco Fabric Switch for IBM BladeCenter.
Regardless of the configured receive BB_credit value, additional buffers, called performance buffers,
improve switch port performance. Instead of relying on the built-in switch algorithm, you can manually
configure the performance buffer value for specific applications (for example, forwarding frames over
FCIP interfaces).
For each physical Fibre Channel interface in any switch in the Cisco MDS 9000 Family, you can specify
the amount of performance buffers allocated in addition to the configured receive BB_credit value.
The default performance buffer value is 0. If you set the performance buffer value to 0, the built-in
algorithm is used. If you do not specify the performance buffer value, 0 is automatically used.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 20-13 Port Group Support for the Extended BB_Credits Feature
1 2
LINK- LINK-
1 2 3 4 5 6 7 8 9 10 11 12 13 14
GIGABIT E THERNET
STATUS
120479
Group 1 Group 2 Group 3
Extended credits
not supported
The port groups that support extended credit configurations are as follows:
Any one port in ports 1 to 4 (identified as Group 1 in Figure 20-2).
Any one port in ports 5 to 8 (identified as Group 2 in Figure 20-2).
Any one port in ports 9 to 12 (identified as Group 3 in Figure 20-2).
Note The last two Fibre Channel ports (port 13 and port 14) and the two Gigabit Ethernet ports
do not support the extended BB_credits feature (see Figure 20-2).
Note The receive BB_credit value for the remaining three ports depends on the port mode.
The default value is 16 for the Fx mode and 255 for E or TE modes. The maximum value
is 255 in all modes. This value can be changed as required without exceeding the
maximum value of 255 BB_credits.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If you assign more than 2,400 (up to a maximum of 3,500) extended BB_credits to the port in
a port group, you must disable the other three ports.
Be aware that changing the BB_credit value results in the port being disabled and then reenabled.
Disable (explicitly) this feature if you need to nondisruptively downgrade to Cisco SAN-OS Release
1.3 or earlier. When you disable this feature, the existing extended BB_credit configuration is
completely erased.
Note The extended BB_credit configuration takes precedence over the receive BB_credit and performance
buffer configurations.
Note Extended BB_credits are not supported on the Cisco MDS 9124 Fabric Switch.
Step 1 Expand Switches > Interfaces and then select FC Physical. You see the interface configuration in the
Information pane.
Step 2 Click the BB Credit tab.
Step 3 In the Extended column, set the extended BB_credits for the selected interface.
Step 4 Click Apply Changes.
Management Interfaces
You can remotely configure the switch through the management interface (mgmt0). To configure a
connection on the mgmt0 interface, you must configure either the IP version 4 (IPv4) parameters (IP
address, subnet mask, and default gateway) or the IP version 6 (IPv6) parameters so that the switch is
reachable.
This section describes the management interfaces and includes the following topics:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You need to explicitly configure a default gateway to connect to the switch and send IP packets or add a
route for each subnet.
VSAN Interfaces
VSANs apply to Fibre Channel fabrics and enable you to configure multiple isolated SAN topologies
within the same physical infrastructure. You can create an IP interface on top of a VSAN and then use
this interface to send frames to this VSAN. To use this feature, you must configure the IP address for
this VSAN. VSAN interfaces cannot be created for nonexisting VSANs.
This section describes VSAN interfaces and includes the following topics:
About VSAN Interfaces, page 20-31
Creating VSAN Interfaces, page 20-31
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip After configuring the VSAN interface, you can configure an IP address or Virtual Router Redundancy
Protocol (VRRP) feature (see Chapter 51, Configuring IP Services).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select the switch and VSAN ID for which you want to configure a VSAN interface.
Note You can only create a VSAN interface for an existing VSAN. If the VSAN does not exist, you
cannot create a VSAN interface for it.
Step 4 Set IPAddress/Mask to the IP address and subnet mask for the new VSAN interface.
Step 5 Click Create to create the VSAN interface or click Close to close the dialog box without creating the
VSAN interface.
Default Settings
Table 20-7 lists the default settings for interface parameters.
Parameters Default
Interface mode Auto
Interface speed Auto
Administrative state Shutdown (unless changed during initial setup)
Trunk mode On (unless changed during initial setup) on
non-NPV and NPIV core switches. Off on NPV
switches.
Trunk-allowed VSANs or VF-IDs 1 to 4093
Interface VSAN Default VSAN (1)
Beacon mode Off (disabled)
EISL encapsulation Disabled
Data field size 2112 bytes
CH A P T E R 21
Configuring N Port Virtualization
N port virtualization (NPV) reduces the number of Fibre Channel domain IDs in SANs. Switches
operating in the NPV mode do not join a fabric. They pass traffic between NPV core switch links and
end devices, which eliminates the domain IDs for these edge switches.
NPV is supported by the following Cisco MDS 9000 switches and Cisco Nexus 5000 Series switches
only:
Cisco MDS 9124 Multilayer Fabric Switch
Cisco MDS 9134 Fabric Switch
Cisco Fabric Switch for HP c-Class BladeSystem
Cisco Fabric Switch for IBM BladeCenter
Cisco Nexus 5000 Series switches
Note NPV is available on these switches only while in NPV mode; if in switch mode, NPV is not available.
About NPV
Typically, Fibre Channel networks are deployed using a core-edge model with a large number of fabric
switches connected to core devices. However, as the number of ports in the fabric increases, the number
of switches deployed also increases, and you can end up with a dramatic increase in the number of
domain IDs (the maximum number supported is 239). This challenge becomes even more difficult when
additional blade chassis are deployed in Fibre Channel networks.
NPV addresses the increase in the number of domain IDs needed to deploy a large number of the ports
by making a fabric or module switch appear as a host to the core Fibre Channel switch, and as a Fibre
Channel switch to the servers in the fabric or blade switch. NPV aggregates multiple locally connected
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
N ports into one or more external NP links, which shares the domain ID of the NPV core switch among
multiple NPV switches (see Figure 21-1). NPV also allows multiple devices to attach to the same port
on the NPV core switch, thereby reducing the need for more ports on the core.
NPV-Core Switch
(MDS or 3rd party switch
with NPIV support)
FC FC
F-port
10.1.1 20.2.1
VSAN 10
5 VS
N AN
V SA 15
NP-port Can have
multiple uplinks
NPV Device uses on different Up to 100
the same domains VSANs NPV switches
as the NPV-core
switches
E-port (server port)
Cisco Fabric Switch
for HP c-Class BladeSystem
10.5.2 10.5.7
Cisco Fabric Switch
FC
for IBM BladeCenter
in a Blade Chassis
Blade Server 1 Target 20.5.1 Initiator
Blade Server 2 (no FL ports)
184639
Blade Server n
While NPV is similar to N port identifier virtualization (NPIV), it does not offer exactly the same
functionality. NPIV provides a means to assign multiple FC IDs to a single N port, and allows multiple
applications on the N port to use different identifiers. NPIV also allows access control, zoning, and port
security to be implemented at the application level. NPV makes use of NPIV to get multiple FCIDs
allocated from the core switch on the NP port.
Figure 21-2 shows a more granular view of an NPV configuration at the interface level.
t
NPV Device
N-Port F-Port NP-Port F-Port
NPV Core Switch
NPIV enable
N-Port F-Port NP-Port F-Port
184631
t NPV Device
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
NPV Mode
A switch is in NPV mode after a user has enabled NPV and the switch has successfully rebooted. NPV
mode applies to an entire switch. All end devices connected to a switch that is in NPV mode must log in
as an N port to use this feature (loop-attached devices are not supported). All links from the edge
switches (in NPV mode) to the NPV core switches are established as NP ports (not E ports), which are
used for typical interswitch links. NPIV is used by the switches in NPV mode to log in to multiple end
devices that share a link to the NPV core switch.
Note In-order data delivery is not required in NPV mode because the exchange between two end devices
always takes the same uplink to the core from the NPV device. For traffic beyond the NPV device, core
switches will enforce in-order delivery if needed and/or configured.
NP Ports
An NP port (proxy N port) is a port on a device that is in NPV mode and connected to the NPV core
switch using an F port. NP ports behave like N ports except that in addition to providing N port behavior,
they also function as proxies for multiple, physical N ports.
NP Links
An NP link is basically an NPIV uplink to a specific end device. NP links are established when the uplink
to the NPV core switch comes up; the links are terminated when the uplink goes down. Once the uplink
is established, the NPV switch performs an internal FLOGI to the NPV core switch, and then (if the
FLOGI is successful) registers itself with the NPV core switchs name server. Subsequent FLOGIs from
end devices in this NP link are converted to FDISCs. For more details refer to the Internal FLOGI
Parameters section on page 21-3.
Server links are uniformly distributed across the NP links. All the end devices behind a server link will
be mapped to only one NP link.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The BB_SCN of internal FLOGIs on NP ports is always set to zero. The BB_SCN is supported at the
F-port of the NPV device.
Figure 21-3 shows the internal FLOGI flows between an NPV core switch and an NPV device.
fc 5/10 fwwn
fc 1/5 pwwn
nwwn
184572
NPV Device
Table 21-1 identifies the internal FLOGI parameters that appear in Figure 21-3.
Although fWWN-based zoning is supported for NPV devices, it is not recommended because:
Zoning is not enforced at the NPV device (rather, it is enforced on the NPV core switch).
Multiple devices behind an NPV device log in via the same F port on the core (they use same fWWN
and cannot be separated into different zones).
The same device might log in using different fWWNs on the core switch (depending on the NPV
link it uses) and may need to be zoned using different fWWNs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Auto
Before Cisco MDS SAN-OS Release 3.3(1a), NPV supported automatic selection of external links.
When a server interface is brought up, an external interface with the minimum load is selected from the
available links. There is no manual selection on the server interfaces using the external links. Also, when
a new external interface was brought up, the existing load was not distributed automatically to the newly
available external interface. This newly brought up interface is used only by the server interfaces that
come up after this interface.
Traffic Map
As in Cisco MDS SAN-OS Release 3.3(1a) and NX-OS Release 4.1(1a), NPV supports traffic
management by allowing you to select and configure the external interfaces that the server uses to
connect to the core switches.
Note When the NPV traffic management is configured, the server uses only the configured external interfaces.
Any other available external interface will not be used.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Balances the load by allowing the user to evenly distribute the load across external interfaces.
Disruptive
Disruptive load balance works intependent of automatic selection of interfaces and configured traffic
map of external interfaces. This feature forces re-init of the server interfaces to achieve load balance
when this feature is enabled and whenever a new external interface comes up. To avoid flapping the
server interfaces too often undesirably, enable this feature once and then disable it whenever the needed
load balance is achieved.
If disruptive load balance is not enabled, you need to manually flap the server interface to move some
of the load to a new external interface.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Configuring NPV
When you enable NPV, the system configuration is erased and the system reboots with the NPV mode
enabled.
Note We recommend that you save the current configuration either on bootflash or a TFTP server before NPV
(if the configuration is required for later use). Use the following commands to save either your non-NPV
or NPV configuration:
SUMMARY STEPS
1. Enable NPIV on the NPV core switch. Enable NPV on the NPV device.
2. Configure the interfaces connected to the NPV core switch as NP ports. Configure the port VSAN
for the NP ports.
3. Configure NPV link as an F port on the NPV core switch. Configure the port VSAN for the F ports.
4. Configure server link on the NPV device.
Note On the 91x4 platform, before you upgrade to 3.2(2c) or downgrade from 3.2(2c), shut the F ports
connected to NPIV-capable hosts, and then disable the NPIV feature. After the upgrade or
downgrade is complete, enable the NPIV feature and then bringup the F ports.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
On the 91x4 platform, before you downgrade from 3.2(2c) to earlier versions, shut the F port, enable
and disable the FC domain persistency for that VSAN and then up the F port.
To use Fabric Manager and Device Manager to configure NPV, follow these steps:
Step 1 Launch Device Manager from the core NPV switch to enable NPIV on the core NPV switch. From the
Admin drop-down menu, select Feature Control. Select enable for the NPIV feature (see Figure 21-4).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Physical Attributes > Switches > N_Port Virtualizer (NPV) as shown in Figure 21-5.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select the Switch from the drop-down list as shown in Figure 21-6.
Step 5 Type the port numbers or click the [...] button (not available on blade server switches) to select the Server
Interface and External Interfaces from the port selection dialog box as shown in Figure 21-7.
Note You can select only one Server Interface but multiple External Interfaces can be mapped on to
it. Previously selected ports are disabled and cannot be selected.
To delete the map entry, select the row from the Traffic Map tab, and then click the icon in the
toolbar or right click and select Delete Row.
Step 1 Choose Physical Attributes > Switches > N_Port Virtualizer (NPV) as shown in Figure 21-8.
Step 2 Click the Load Balance tab.
Step 3 Check the Enable checkbox to enable disruptive load balancing on the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To enable disruptive load balancing on all the switches, check the Enable All check box as shown in
Figure 21-8.
Note For Cisco Nexus 5000 Series switches, you must first enable the NPV mode for the switch by choosing
Switches > N_Port Virtualization (NPV) in the Physical Attributes pane, and then use the NPV wizard
to configure other NPV-related settings on the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Select Tools > NPV > NPV Setup... to launch NPV Setup Wizard from Fabric Manager.
(See Figure 21-9.)
Before the wizard starts, Fabric Manager checks if there are any NPV- and NPIV-capable switches from
the clients SAN. An NPV-capable switch has to be a Cisco MDS 9124, 9134, a Cisco Nexus 5000 Series
switch, an HP Blade Server, or an IBM Blade Server with SAN-OS version 3.2.2 and later. An
NPIV-capable switch has to be Cisco switch with SAN-OS 3.0.1 and later. If there are no NPV-capable
switches, Fabric Manager displays an error message. (See Figure 21-10.)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
A table lists all the available NPV-capable switches including the switches on which NPV is not yet
enabled. Check the check boxes to select the required NPV devices. On devices that are not NPV
enabled, this wizard will enable NPV on the devices in the final step.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If you choose switches that are NPV disabled and click Next, a warning message appears with a list of
IP addresses of the NPV devices on which NPV will be enabled. Enabling NPV on the switch will result
in reboot of the switch. Boot variables of the switches have to be set, to enable NPV on them through
this wizard. (See Figure 21-12.)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Check the check boxes to select the required NPIV core switches. The table lists all the available NPIV
core switches including the core switches that have not yet enabled the NPIV feature. The NPIV core
switches which are not NPIV enabled, this wizard will enable NPIV on them in the final step.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Create new NPV device and NPIV core switch pairs as required. (See Figure 21-14.)
Figure 21-14 Creating NPV Device and NPIV Core Switch Pairs
Based on selections in the previous steps, the wizard displays all available NPV devices and NPIV core
switches in separate lists. You can select one from each list and click Add or Remove buttons to create
new NPV device and NPIV core switch combinations or pairs.
The NPV wizard checks if there are any NPIV core switches that are already connected to the NPV
devices selected in the previous step. Click the Add Connected Pairs button to add a list of all the
existing pairs that are interconnected, to the Selected table.
The Selected table is then populated with both the existing and the intended pairs. Each NPIV core
switch can be paired with multiple NPV devices.
After Step 6, the wizard prompts you to physically connect the new pairs that are not yet connected.
On the switches that are not paired, the NPV wizard enables the NPV and NPIV modes. However, there
is a possibility that these unpaired switches may be segmented and lose their presence on the fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
After you click the Next button in Step 3 of 6, the wizard determines if you have selected all the
connected pairs. A warning message is displayed (See Figure 21-17), that lists all the connected pairs
that you have not selected and warns that they will be segmented after the NPV setup.
Note NPV wizard does not detect ports that are in a channel group and that are not connected by ISLs.
The wizard does not configure any port in a Port Channel Group to F ports on the core switch. Port
channel grouping is not applicable to NPV devices. (See Figure 21-15.)
Remove the port channel groups if you need to select those particular ports as F ports during the
setup. For more information, see the Configuring Port Security section on page 46-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 You can configure NPV associated ports either through automated or manual methods.
(See Figure 21-18.)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The ISLs are considered in the second method. The selection algorithm spreads out the free port
selections, so that the first port in every four ports is selected, for example, the 1st, 5th, 9th, etc. If after
going through the 1st port in every four ports, you still have not selected enough ports (because the
preferred ports were not free) then move to the second port in every four, for example, the 2nd, 6th, 10th
etc. Different switches have different port preferences.
Ports on the NPIV switch are selected in the following way:
During automatic port selection on the NPIV switch free ports are defined as ports that are licensed FC
ports and ports that have "Operational status" = Auto and "Status Cause" =none(2), offline(8) or sfp not
present(29). If the ports are found in any other operational state, (for example F, NP, E, TE etc), then
they are considered used, except for E and TE ports that are in ISLs connected to NPV device switches
that will be enabled for NPV mode in this wizard session, as they will be considered to be free.
However, these ISL ports will not necessarily be the ports selected by the automatic port selection
algorithm as they are treated no different then any other free port. If you want to convert those used
ISL ports, then choose the Convert existing ISLs option first and then run the wizard a second time
choosing Automatic port selection (option 2) to add additional links.
When you choose to configure ports from available ports, the wizard searches for ports that are not
currently participating in NP link configuration. It is possible that all ports can be participating in NP
port configuration. In that case a warning message is displayed. (See Figure 21-19.)
Note In both manual and automatic methods of Configuring NPV associated ports, the ports that are unhealthy
or which are in adminDown state are not considered during port selection.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Select the Manual method to manually create port pairs (see Figure 21-20.) Click on a satellite switch
and select the NP device port expanded under each of the NPV switches listed. Then select the required
F port on the NPIV core switch and click Add for them to pair.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
During manual selection from the list for NPV and NPIV, ports are defined as the licensed FC ports with
"Operational status" = Auto and "Status Cause" = none(2), offline(8), or sfp not present(29) and
'Operational Status" = TE or E.
Note Failed ports with the Auto operational status will not be listed. Failed ports with the E
operational status will be listed and available for NPV configuration.
Based on user selection, the wizard decides which ports are set to NP ports on the NPV device side and
which are F ports on the core switch side to make an NPV connection.
Note Some times the Manual selection in step 4 does not show any port when the NPV switch tree is expanded
as the NPV Wizard filters out ports that are in fail or down status. Only healthy ports are made visible
in the NPV Switch tree. Check your port settings.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
From the drop-down list select a VSAN or enter a VSAN ID to specify the VSAN. All selected NPV
devices and NPIV core switches are added to the specified VSAN. All ports on the selected NPV devices
and associated ports on the NPIV core switches are added to the VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 21-23 Mapping Server Interfaces with External Interfaces for Load Balancing
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To select the NPV devices that need load balancing, click Configure Load Balancing, and then select
the NPV devices for disruptive load balancing as shown in Figure 21-24.
To set up the traffic management map, select at least one switch of version 4.1(1a) or above, a server
interface, and external interfaces. To add a map entry, follow these steps:
a. Click Add to create a new map row.
b. Double-click the NPV Device cell and select the switch from the drop-down list.
c. Double-click the Server Interface cell and then type the port numbers or click the [...] button (not
available on blade server switches) in the cell to display the port selection dialog box. In the port
selection dialog box, click the numbered buttons to select the ports as shown in Figure 21-25.
Note You can select only one Server If port in a row, but multiple External IF ports can be mapped
to it. Previously selected ports are disabled and cannot be selected.
d. Double-click the External Interfaces cell and type the port numbers or click the [...] button (not
available on blade server switches) in the cell to display the port selection dialog box. In the port
selection dialog box, click the numbered buttons to select the ports as shown in Figure 21-25.
To delete an exsiting map entry, select the row, and then click Delete.
To delete all the existing map entries, click Delete All.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 8 Review all the NPV Setup configurations you entered in the earlier steps and click Finish to complete
the setup as shown in Figure 21-26.
Enable Switch Feature lists the switches, the impending actions against them with reference to features,
and the resultant status.
Set Port Type lists the switches and the ports to be set on the switches to configure NPV associate ports.
Configure VSAN lists the switches and ports to be added to the specified VSAN.
Click >> to view the expanded the panes. Click << to collapse the panes.
A progress bar at the bottom of the window indicates the overall extent of completion of the
configuration tasks. A text message that runs below the progress bar indicates the current task in
progress.
The status cells against each item indicate In progress, Success, and Error states. When a configuration
cannot be applied, the status cell against the task is changed to Error. Click Error to view Details. A
message is displayed in place of the progress bar stating, Cannot apply all configurations as shown in
Figure 21-27
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
After the completion of all the tasks a link View NPV Port Connections is displayed in the place of the
progress bar. (See Figure 21-27.)
Click View NPV Port Connections to view the NPV port connections in a table (See Figure 21-29).
Refer to this list to verify the physical connections between NP Port on NPV devices and Auto ports) on
NPIV core switches. The physical connections already exist in case of the ISLs and they have to be
verified. In some cases when the physical connections do not exist, they have to be established manually.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
DPVM Configuration
When NPV is enabled, the following requirements must be met before you configure DPVM on the NPV
core switch:
You must explicitly configure the WWN of the internal FLOGI in DPVM. If DPVM is configured
on the NPV core switch for an end device that is connected to the NPV device, then that end device
must be configured to be in the same VSAN. Logins from a device connected to an NPV device will
fail if the device is configured to be in a different VSAN. To avoid VSAN mismatches, ensure that
the internal FLOGI VSAN matches the port VSAN of the NP port.
The first login from an NP port determines the VSAN of that port. If DPVM is configured for this
first login, which is the internal login of the NPV device, then the NPV core switchs VSAN F port
is located in that VSAN. Otherwise, the port VSAN remains unchanged.
For details about DPVM configuration, see Chapter 28, Creating Dynamic VSANs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Once these requirements are met, you can enable port security as you would in any other context. For
details about enabling port security, see Chapter 46, Configuring Port Security.
CH A P T E R 22
Configuring Generation 2 and Generation 3
Switching Modules
Cisco MDS 9000 Family hardware modules and switches are categorized into generations based on the
time of introduction, capabilities, features, and compatibilities:
Generation 1Modules and switches with a maximum port speed of 2 Gbps.
Generation 2Modules and switches with a maximum port speed of 4 Gbps.
Generation 3Modules and switches with a maximum port speed of 8 Gbps.
This chapter describes how to configure these modules and switches, including the following sections:
About Generations of Modules and Switches, page 22-1
Port Groups and Port Rate Modes, page 22-3
Buffer Credit Allocation, page 22-10
Combining Generation 1, Generation 2, and Generation 3 Modules, page 22-24
Configuring Module Interface Shared Resources, page 22-28
Displaying SFP Diagnostic Information, page 22-41
Default Settings, page 22-43
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 22-1 identifies the modules supported by the Cisco MDS 9500 Series switches and Cisco MDS
9216A and Cisco MDS 9216i switches, as well as the Fabric switches.
Note Generation 2 Fibre Channel switching modules are not supported on the Cisco MDS 9216 switch;
however, they are supported by both the Supervisor-1 module and the Supervisor-2 module.
For detailed information about the installation and specifications for these modules and switches, refer
to the hardware installation guide for your switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Port Groups
Each module or switch can have one or more ports in port groups that share common resources such as
bandwidth and buffer credits. Port groups are defined by the hardware consisting of sequential ports. For
example, ports 1 through 12, ports 13 through 24, ports 25 through 36, and ports 37 through 48 are the
port groups on the 48-port 4-Gbps Fibre Channel switching modules.
Table 22-2 shows the port groups for the Generation 2 and Generation 3 Fibre Channel modules, and
Generation 2 Fabric switches.
Table 22-2 Bandwidth and Port Groups for the Fibre Channel Modules and Fabric Switches
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 22-2 Bandwidth and Port Groups for the Fibre Channel Modules and Fabric Switches
Note In Generation 1 modules, you cannot configure the port rate modes. The mode is determined implicitly
based on the port mode and line card type.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Port rate modes are not supported on the Cisco Fabric Switch for HP c-Class BladeSystem, and the Cisco
Fabric Switch for IBM BladeCenter.
Table 22-3 shows the modules that support dedicated, shared, and the default rate modes.
Table 22-3 Port Rate Mode Support on Generation 2 and Generation 3 Modules and Switches
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 22-3 Port Rate Mode Support on Generation 2 and Generation 3 Modules and Switches
Table 22-4 Bandwidth Reserved for the Port Speeds on Generation 3 Switching Modules
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 22-5 show the amount of bandwidth reserved for a configured port speed on 4-Gbps switching
modules.
Table 22-5 Bandwidth Reserved for the Port Speeds on Generation 2 Switching Modules
Note The 4-Port 10-Gbps Fibre Channel module ports in auto mode only support auto speed mode at 10 Gbps.
Table 22-6 Dedicated Rate Mode Bandwidth Reservation for Generation 3 Fibre Channel
Modules
Dedicated Maximum
Product Name/ Bandwidth Allowed Ports
Part Number Description per Port that can come up Ports in Shared Mode
DS-X9248-96K9 48-port 8-Gbps 8 Gbps 8 Ports All the remaining ports
Fibre Channel 4 Gbps 24 Ports are 8 Gbps shared.
switching module
2 Gbps 48 Ports
DS-X9224-96K9 24-port 8-Gbps 8 Gbps 8 Ports All the remaining ports
Fibre Channel 4 Gbps 24 Ports are 8 Gbps shared.
switching module
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 22-6 Dedicated Rate Mode Bandwidth Reservation for Generation 3 Fibre Channel
Modules (continued)
Dedicated Maximum
Product Name/ Bandwidth Allowed Ports
Part Number Description per Port that can come up Ports in Shared Mode
DS-X9248-48K9 4/44-port 8-Gbps 8 Gbps 4 Ports All the remaining ports
Host-Optimized 4 Gbps 12 Ports are 4 Gbps shared (8 Gbps
Fibre Channel of bandwidth can be
switching module 2 Gbps 24 Ports provided only to one port
1 Gbps 48 Ports per port group in
Dedicated or Shared rate
mode).
Step 1 On the Device Manager window, right-click the 8-Gbps Fibre Channel module.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 22-7 describes the default RateMode configuration schemes available in the Bandwidth
Reservation Configuration dialog box for the 8-Gbps modules.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Ports configured in dedicated rate mode are allocated the required bandwidth to sustain a line rate of
traffic at the maximum configured operating speed, and ports configured in shared mode share the
available remaining bandwidth within the port group. Bandwidth allocation among the shared mode
ports is based on the operational speed of the ports. For example, if four ports operating at speeds 1 Gbps,
1 Gbps, 2 Gbps, and 4 Gbps share bandwidth of 8 Gbps, the ratio of allocation would be 1:1:2:4.
Out-of-Service Interfaces
On supported modules and fabric switches, you might need to allocate all the shared resources for one
or more interfaces to another interface in the port group or module. You can take interfaces out of service
to release shared resources that are needed for dedicated bandwidth. When an interface is taken out of
service, all shared resources are released and made available to the other interface in the port group or
module. These shared resources include bandwidth, rate mode, BB_credits, and extended BB_credits.
All shared resource configurations are returned to their default values when the interface is brought back
into service. Corresponding resources must be made available in order for the port to be successfully
returned to service.
Caution If you need to bring an interface back into service, you might disrupt traffic if you need to release shared
resources from other interfaces in the same port group.
Buffer Pools
In the architecture of Generation 2 and Generation 3 modules, receive buffers shared by a set of ports
are called buffer groups. The receive buffer groups are organized into global and local buffer pools.
The receive buffers allocated from the global buffer pool to be shared by a port group are called a global
recieve buffer pool. Global receive buffer pools include the following buffer groups:
Reserved internal buffers
Allocated BB_credit buffers for each Fibre Channel interface (user configured or assigned by
default)
Common unallocated buffer pool for BB_credits, if any, to be used for additional BB_credits as
needed
Performance buffers (only used on 12-port 4-Gbps and 4-port 10-Gbps switching modules)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The 48-Port and 24-Port 8-Gbps modules have dual global buffer pools. Each buffer pool in the 48-port
modules support 24 ports and in the 24-port modules each buffer pool supports 12 ports.
Figure 22-3 shows the allocation of BB_credit buffers on linecards (24-port and 48-port 4-Gbps line
cards).
Figure 22-3 Receive Buffers for Fibre Channel Ports in a Global Buffer Pool
Total BB_credit
Common unallocated buffer pool for BB_credits
buffers
Allocated BB_credit buffers
1 2 3 for each front panel FC ports N
185164
Figure 22-4 shows the default BB_credit buffer allocation model for 48-port 8-Gbps switching modules.
The minimum BB_credits required to bring up a port is two buffers.
48-port module
Dedicated Shared
32 BB credits
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 22-5 shows the default BB_credit buffer allocation model for 24-port 8-Gbps switching modules.
The minimum BB_credits required to bring up a port is two buffers.
24-port module
Dedicated Shared
32 BB credits
189047
500 BB credits 500 BB credits 500 BB credits 500 BB credits
Figure 22-6 shows the default BB_credit buffer allocation model for 4/44-port 8-Gbps Host-Optimized
switching modules. The minimum BB_credits required to bring up a port is two buffers.
4/44-port module
Dedicated Shared
32 BB credits
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 22-7 shows the default BB_credit buffer allocation model for 24-port 4-Gbps switching modules.
The minimum BB_credits required to bring up a port is two buffers.
24-port module
Dedicated Shared
16 BB credits
144856
250 BB credits 250 BB credits 250 BB credits
Note The default BB_credit buffer allocation is the same for all port speeds.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The following guidelines apply to BB_credit buffers on 48-port 8-Gbps Fibre Channel switching
modules:
BB_credit buffers allocated for ports 1 through 24 and 25 through 48 can be a maximum of 6000
each so that the load is distributed.
BB_credit buffers for ISL connections can be configured from a minimum of 2 buffers to a
maximum of 500 buffers for dedicated rate mode.
BB_credit buffers for Fx port mode connections can be configured. The minimum is 2 buffers and
the maximum of 500 buffers for dedicated rate mode or 32 buffers for shared rate mode.
Performance buffers are not supported on this module.
Each port group on the 48-port 8-Gbps Fibre Channel switching module consists of six ports. The ports
in shared rate mode in a port group can have a maximum bandwidth oversubscription of 10:1 considering
that each port group has 12.8-Gbps bandwidth.
The following example configurations are supported by the 48-port 8-Gbps Fibre Channel switching
modules:
Six ports with shared rate mode and 8-Gbps speed (4:1 oversubscription) (default)
One port with dedicated rate mode and 8-Gbps speed plus
five ports with shared rate mode and 8-Gbps speed (10:1 oversubscription)
Two ports with dedicated rate mode and 4-Gbps speed plus
four ports with shared rate mode and 4-Gbps speed (4:1 oversubscription)
One port with dedicated rate mode and 4-Gbps speed plus
three ports with dedicated rate mode and 2-Gbps speed plus
two ports with shared rate mode and 4-Gbps speed (4:1 oversubscription)
Six ports with dedicated rate mode and 2-Gbps speed
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The following guidelines apply to BB_credit buffers on 24-port 8-Gbps Fibre Channel switching
modules:
BB_credit buffers allocated for ports 1 through 12 and 13 through 24 can be a maximum of 6000
each so that the load is distributed.
BB_credit buffers for ISL connections can be configured from a minimum of 2 buffers to a
maximum of 500 buffers for dedicated rate mode.
BB_credit buffers for Fx port mode connections can be configured. The minimum is 2 buffers and
the maximum of 500 buffers for dedicated rate mode or 32 buffers for shared rate mode.
Performance buffers are not supported on this module.
Each port group on the 24-port 8-Gbps Fibre Channel switching module consists of three ports. The ports
in shared rate mode in a port group can have a maximum bandwidth oversubscription of 10:1 considering
that each port group has 12.8-Gbps bandwidth.
The following example configurations are supported by the 24-port 8-Gbps Fibre Channel switching
modules:
Three ports with shared rate mode and 8-Gbps speed (2:1 oversubscription) (default)
One port with dedicated rate mode and 8-Gbps speed plus
two ports with shared rate mode and 8-Gbps speed (4:1 oversubscription)
One port with dedicated rate mode and 8-Gbps speed plus
one port with dedicated rate mode and 4-Gbps speed plus
one port with shared rate mode and 8-Gbps speed (10:1 oversubscription)
Two ports with dedicated rate mode and 4-Gbps speed plus
one port with shared rate mode and 8-Gbps speed (2:1 oversubscription)
Three ports with dedicated rate mode and 4-Gbps speed
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The following guidelines apply to BB_credit buffers on 4/44-port 8-Gbps Fibre Channel switching
modules:
BB_credit buffers for ISL connections can be configured from a minimum of 2 buffers to a
maximum of 500 buffers for dedicated rate mode.
BB_credit buffers for Fx port mode connections can be configured. The minimum is 2 buffers and
the maximum of 250 buffers for dedicated rate mode or 32 buffers for shared rate mode.
Performance buffers are not supported on this module.
Each port group on the 24-port 8-Gbps Fibre Channel switching module consists of 12 ports. The ports
in shared rate mode in a port group can have a maximum bandwidth oversubscription of 10:1 considering
that each port group has 12.8-Gbps bandwidth.
The following example configurations are supported by the 4/44-port 8-Gbps Fibre Channel switching
modules:
Twelve ports with shared rate mode and 4-Gbps speed (5:1 oversubscription) (default)
One port with dedicated rate mode and 8-Gbps speed plus
eleven ports with shared rate mode and 4-Gbps speed (10:1 oversubscription)
One port with dedicated rate mode and 4-Gbps speed plus
three ports with dedicated rate mode and 3-Gbps speed plus
eight ports with shared rate mode and 4-Gbps speed (2:1 oversubscription)
Twelve ports with dedicated rate mode and 1-Gbps speed
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The following considerations apply to BB_credit buffers on 48-port 4-Gbps Fibre Channel switching
modules:
BB_credit buffers for ISL connections can be configured from a minimum of 2 buffers to a
maximum of 250 buffers for dedicated rate mode or 16 buffers for shared rate mode.
BB_credit buffers for Fx port mode connections can be configured. The minimum is 2 buffers and
the maximum of 250 buffers for dedicated rate mode or 16 buffers for shared rate mode.
Performance buffers are not supported on this module.
Each port group on the 48-port 4-Gbps Fibre Channel switching module consists of 12 ports. The ports
in shared rate mode have bandwidth oversubscription of 2:1 by default. However, some configurations
of the shared ports in a port group can have maximum bandwidth oversubscription of 4:1 (considering
that each port group has 12.8-Gbps bandwidth).
The following example configurations are supported by the 48-port 4-Gbps Fibre Channel switching
modules:
Twelve ports with shared rate mode and 4-Gbps speed (4:1 oversubscription) (default)
One port with dedicated rate mode and 4-Gbps speed plus
11 ports with shared rate mode and 4-Gbps speed (5:1 oversubscription)
One port with dedicated rate mode and 4-Gbps speed plus
11 ports with shared rate mode and 2-Gbps speed (2.5:1 oversubscription)
Two ports with dedicated rate mode and 2-Gbps speed plus
10 ports with shared rate mode and 4-Gbps speed (5:1 oversubscription)
Two ports with dedicated rate mode and 2-Gbps speed plus
10 ports with shared rate mode and 2-Gbps speed (2.5:1 oversubscription)
Twelve ports with dedicated rate mode and 1-Gbps speed
Three ports with dedicated rate mode and 4-Gbps speed plus
four ports with shared rate mode and 1-Gbps speed plus
five ports put out-of-service (see Figure 22-8)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 22-8 Example Speed and Rate Configuration on a 48-Port 4-Gbps Switching Module
1 3 5 7 9 11
2 4 6 8 10 12
144858
Service Service Service
Six ports with dedicated rate mode and 2-Gbps speed plus
four ports with shared rate mode and 1-Gbps speed plus
two ports put out-of-service (see Figure 22-9)
Figure 22-9 Example Speed and Rate Configuration on a 48-Port 4-Gbps Switching Module
1 3 5 7 9 11
2 4 6 8 10 12
Service
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The following considerations apply to BB_credit buffers on 24-port 4-Gbps Fibre Channel switching
modules:
BB_credit buffers for ISL connections can be configured from a minimum of 2 buffers to a
maximum of 250 buffers for dedicated rate mode or 16 buffers for shared rate mode.
BB_credit buffers for Fx port mode connections can be configured. The minimum is 2 buffers and
the maximum of 250 buffers for dedicated rate mode or 16 buffers for shared rate mode.
Performance buffers are not supported on this module.
Each port group on the 24-port 4-Gbps Fibre Channel switching module consists of six ports. The ports
in shared rate mode have a bandwidth oversubscription of 2:1 by default. However, some configurations
of the shared ports in a port group can have a maximum bandwidth oversubscription of 4:1 (considering
that each port group has 12.8-Gbps bandwidth).
The following example configurations are supported by the 24-port 4-Gbps Fibre Channel switching
modules:
Six ports with shared rate mode and 4-Gbps speed (2:1 oversubscription) (default)
Two ports with dedicated rate mode and 4-Gbps speed plus
four ports with shared rate mode and 4-Gbps speed (with 4:1 oversubscription)
One port with dedicated rate mode and 4-Gbps speed plus
three ports with dedicated rate mode and 2-Gbps speed plus
two ports with shared rate mode and 4-Gbps speed (4:1 oversubscription)
Six ports with dedicated rate mode and 2-Gbps speed
Three ports with dedicated rate mode and 4-Gbps speed plus
three ports with shared rate mode and 1-Gbps speed (see Figure 22-10)
Figure 22-10 Example Speed and Rate Configuration on a 24-Port 4-Gbps Switching Module
1 2 3 4 5 6
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The following considerations apply to BB_credit buffers on18-port 4-Gbps Fibre Channel switching
modules:
BB_credit buffers for ISL connections can be configured from a minimum of 2 buffers to a
maximum of 250 buffers for dedicated rate mode or 16 buffers for shared rate mode.
BB_credit buffers for Fx port mode connections can be configured. The minimum is 2 buffers and
the maximum of 250 buffers for dedicated rate mode or 16 buffers for shared rate mode.
Performance buffers are not supported on this module.
The following considerations apply to BB_credit buffers on 12-port 4-Gbps switching modules:
BB_credit buffers for ISL connections can be configured from a minimum of 2 buffers to a
maximum of 250 buffers.
BB_credit buffers for Fx port mode connections can be configured from a minimum of 2 buffers to
a maximum of 250 buffers.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
By default, 512 performance buffers are preallocated and are shared by all the ports. These buffers
are configurable and the buffers are assigned to the port based on the availability of the buffers in
the shared pool.
There are 2488 extra buffers available as extended BB_credit buffers after allocating all the default
BB_credit buffers for all the ports in ISL mode (5488 - (250 * 12)).
Note Extended BB_credits are allocated across all ports on the switch. That is, they are not allocated
by port group.
Note By default, the ports in the 12-port 4-Gbps switching modules come up in 4-Gbps dedicated rate mode
but can be configured as 1-Gbps and 2-Gbps dedicated rate mode. Shared mode is not supported.
Note The ports in the 4-port 10-Gbps switching module only support 10-Gbps dedicated rate mode. FL port
mode and shared rate mode are not supported.
The following considerations apply to BB_credit buffers on 4-port 10-Gbps switching modules:
BB_credit buffers for ISL connections can be configured from a minimum of 2 buffers to a
maximum of 750 buffers.
BB_credit buffers for Fx port mode connections can be configured from a minimum of 2 buffers to
a maximum of 750 buffers.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
By default, 512 performance buffers are preallocated and are shared by all the ports. These buffers
are configurable and the buffers are assigned to the port based on the availability of the buffers in
the shared pool.
There are 2488 extra buffers available as extended BB_credits after allocating all the default
BB_credit buffers for all the ports in ISL mode (5488 - (750 * 4)).
Note Extended BB_credits are allocated across all ports on the switch. That is, they are not allocated
by port group.
Table 22-16 32-Port 4-Gbps Switching Module BB_Credit Buffer Allocation Defaults
BB_Credit
Buffers Per
BB_Credit Buffer Allocation Type Port Group BB_Credit Buffers Per Port
ISL1 Fx Port
User-configurable BB_credit buffers on 4-Gbps 64 64 64
mode
Default BB_credit buffers 64 16 16
1. ISL = E port or TE port.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 22-17 24-Port 4-Gbps Switching Module BB_Credit Buffer Allocation Defaults
BB_Credit
Buffers Per BB_Credit Buffers Per Port
BB_Credit Buffer Allocation Type Port Group Defaults
ISL1 Fx Port
User-configurable BB_credit buffers 64 16 16
1. ISL = E port or TE port.
Table 22-18 18-Port 4-Gbps Switching Module BB_Credit Buffer Allocation Defaults
BB_Credit
Buffers Per BB_Credit Buffers Per Port
BB_Credit Buffer Allocation Type Port Group Defaults
ISL1 Fx Port
User-configurable BB_credit buffers 4509 250 16
1. ISL = E port or TE port.
Extended BB_Credits
Note Extended BB_credits are not supported on the Cisco MDS 9124 Fabric Switch, Cisco MDS 9134 Fabric
Switch, Cisco MDS 9222i Fabric Switch, the Cisco Fabric Switch for HP c-Class BladeSystem, and the
Cisco Fabric Switch for IBM BladeCenter.
To facilitate BB_credits for long haul links, the extended BB_credits feature allows the user to configure
the receive buffers above the maximum value on all Generation 2 switching modules (see the Buffer
Credit Allocation section on page 22-10). When necessary, you can reduce the buffers on one port and
assign them to another port, exceeding the default maximum. The minimum extended BB_credits per
port is 256 and the maximum is 4095.
In general, the user can configure any port in a port group to dedicated rate mode. To do this, you must
first release the buffers from the other ports before configuring larger extended BB_credits for a port.
Note The ENTERPRISE_PKG license is required to use extended BB_credits on Generation 2 switching
modules. Also, extended BB_credits are not supported by ports in shared rate mode.
All ports on the Generation 2 switching modules support extended BB_credits. There are no limitations
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
for how many extended BB_credits you can assign to a port (except for the maximum and minimum
limits). If necessary, you can take interfaces out of service to make more extended BB_credits available
to other ports.
Note When a Cisco or a other vendor switch port is connected to a Generation 1 module port (ISL
connection), the receive buffer-to-buffer credits of the port connected to the Generation 1 module port
should not exceed 255.
Port Indexes
Cisco MDS 9000 switches allocate index identifiers for the ports on the modules. These port indexes
cannot be configured. You can combine Generation 1, Generation 2, and Generation 3 switching
modules, with either Supervisor-1 modules or Supervisor-2 modules. However, combining switching
modules and supervisor modules has the following port index limitations:
Supervisor-1 modules only support a maximum of 252 port indexes, regardless of the type of
switching modules.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Supervisor-2 modules support a maximum of 1020 port indexes when all switching modules in the
chassis are Generation 2 or Generation 3.
Supervisor-2 modules only support a maximum of 252 port indexes when only Generation 1
switching modules, or a combination of Generation 1, Generation 2, or Generation 3 switching
modules, are installed in the chassis.
Note On a switch with the maximum limit of 252 port index maximum limit, any new module that exceeds the
limit when installed does not power up.
Generation 1 switching modules have specific numbering requirements. If these requirements are not
met, the module does not power up. The port index numbering requirements include the following:
If port indexes in the range of 256 to 1020 are assigned to operational ports, Generation 1 switching
modules do not power up.
A block of contiguous port indexes is available. If this block of port indexes is not available,
Generation 1 modules do not power up. Table 22-19 shows the port index requirements for the
Generation 1 modules.
Note If the switch has Supervisor-1 modules, the block of 32 contiguous port indexes must begin on the slot
boundary. The slot boundary for slot 1 is 0, for slot 2 is 32, and so on. For Supervisor-2 modules, the
contiguous block can start anywhere.
The allowed mix of Generation 1 and Generation 2 switching modules in a chassis is determined at
run-time, either when booting up the switch or when installing the modules. In some cases, the sequence
in which switching modules are inserted into the chassis determines if one or more modules is powered
up. When a module does not power up because of a resource limitation, you can see the reason by
viewing the module information in the Information pane.
For information on recovering a module powered-down because port indexes are not available, refer to
the Cisco MDS 9000 Family Troubleshooting Guide, Release 3.x.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PortChannels
PortChannels have the following restrictions:
The maximum number of PortChannels allowed is 256 if all switching modules are Generation 2 or
Generation 3, or both.
The maximum number of PortChannels allowed is 128 whenever there is a Generation 1 switching
module in use with a Generation 2 or Generation 3 switching module.
Ports need to be configured in dedicated rate mode on the Generation 2 and Generation 3 switching
module interfaces to be used in the PortChannel.
Note The number of PortChannels allowed does not depend on the type of supervisor module. However,
Generation 3 modules require the Supervisor 2 module on the MDS 9506 and 9509 switches.
The Generation1, Generation 2, and Generation 3 modules have the following restrictions for
PortChannel configuration:
Generation 1 switching module interfaces do not support auto speed with a maximum of 2 Gbps.
Generation 1 and Generation 2 module interfaces do not support auto speed with maximum of 4
Gbps.
Generation 2 and Generation 3 switching module interfaces cannot be forcefully added to a
PortChannel if sufficient resources are not available.
When configuring PortChannels on switches with Generation 1, Generation 2, and Generation 3
switching modules, follow one of these procedures:
Configure the PortChannel, and then configure the Generation 2 and Generation 3 interfaces to auto
with a maximum of 2 Gbps.
Configure the Generation 1 switching modules followed by the Generation 2 switching modules, and
then the Generation 3 switching modules, and then configure the PortChannel.
When configuring PortChannels on switches with only Generation 2 and Generation 3 switching
modules, follow one of these procedures:
Configure the PortChannel, and then configure the Generation 3 interfaces to auto with a maximum
of 4 Gbps.
Configure the Generation 2 switching modules, followed by the Generation 3 switching modules,
and then configure the PortChannel.
Table 22-20 describes the results of adding a member to a PortChannel for various configurations.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you change the port bandwidth reservation parameters on a 48-port or 24-port module, the change
affects only the changed port. No other ports in the port group are affected.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Use the following guidelines to configure 4-port 10-Gbps switching modules when starting with the
default configuration:
1. Configure the port mode.
See the About Interface Modes section on page 20-3.
2. Configure the BB_credits, performance buffers, and extended BB_credits, as necessary.
See the BB_Credit Buffers for Switching Modules section on page 22-13, BB_Credit Buffers for
Fabric Switches section on page 22-22, and the Extended BB_Credits section on page 22-23.
Note The Generation 2, 4-port 10-Gbps switching module supports 10-Gbps traffic only.
On Generation 3, 8-Gbps modules, setting the port speed to auto enables autosensing, which
negotiates to a maximum speed of 8 Gbps.
On Generation 2, 4-Gbps modules, setting the port speed to auto enables autosensing, which
negotiates to a maximum speed of 4 Gbps.
Caution Changing port speed and rate mode disrupts traffic on the port. Traffic on other ports in the port group
is not affected.
To configure dedicated bandwidth on an interface using Fabric Manager, follow these steps:
Step 1 Select a switch from the Fabric pane, or select a group of switches (SAN, fabric, VSAN) from the
Logical Domains pane.
Step 2 Expand Switches, expand Interfaces and select FC Physical from the Physical Attributes pane.
You see the FC Physical > General tab in the Interfaces pane.
Step 3 Scroll until you see the row containing the switch and port you want to configure.
Step 4 Select auto, 1Gb, 4Gb, or autoMax2G from the Speed Admin column (see Figure 22-11).
Note The Generation 3, 8-Gbps Fibre Channel swtiching modules support the following speed
configurations: 1G, 2G, 4G, 8G, autoMax2G, autoMax4G and the auto speed configuration
configures autosensing for the interface with 8 Gbps of bandwidth reserved.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The auto parameter enables autosensing on the interface. The autoMax2G parameter enables autosensing
on the interface with a maximum speed of 2 Gbps.
Note If you change the port bandwidth reservation parameters on a 48-port or 24-port 4-Gbps, or any
8-Gbps Fibre Channel switching module, the change affects only the changed port. No other
ports in the port group are affected.
Step 1 Select a switch from the Fabric pane, or select a group of switches (SAN, fabric, VSAN) from the
Logical Domains pane.
Step 2 Expand Switches > Interfaces and then select FC Physical from the Physical Attributes pane.
You see the FC Physical > General tab in the Interfaces pane.
Step 3 Scroll until you see the row containing the switch and port you want to configure.
Step 4 Select dedicated or shared from the Rate Mode column (see Figure 22-12).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Changing port speed and rate mode disrupts traffic on the port.
All ports in the 48-port and 24-port 4-Gbps modules can be configured to operate at 4 Gbps in shared
mode even if other ports in the port group are configured in dedicated mode, regardless of available
bandwidth. However, when oversubscription ratio restrictions are enabled, you may not have all shared
4-Gbps module ports operating at 4 Gbps.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
All ports in the 48-port and 24-port 8-Gbps modules can be configured to operate at 8 Gbps in shared
mode even if other ports in the port group are configured in dedicated mode, regardless of available
bandwidth. However, when oversubscription ratio restrictions are enabled you may not have all shared
8-Gbps module ports operating at 8 Gbps.
On the 48-port and 24-port 8-Gbps modules, if you have configured one 8-Gbps dedicated port in one
port group, no other ports in the same port group can be configured to operate at 8-Gbps dedicated mode.
You can have any number of 8-Gbps shared and 4-Gbps dedicated or shared ports. On the 4/44-port
8-Gbps module, only one port per port group can be configured in 8-Gbps dedicated or shared mode.
In the following example, a 24-port 4-Gbps module has oversubscription ratios enabled and three
dedicated ports in one port group operating at 4-Gbps. No other ports in the same port group can be
configured to operate at 4 Gbps.
For dedicated ports, oversubscription ratio restrictions do not apply to the shared pool in port groups. So
if oversubscription ratio restrictions are disabled, and you have configured three 4-Gbps dedicated ports
in one port group, then you can configure all other ports in the same port group to operate at a shared
rate of 4 Gbps.
When disabling restrictions on oversubscription ratios, all ports in shared mode on 48-port and 24-port
4-Gbps or any 8-Gbps Fibre Channel switching modules must be shut down. When applying restrictions
on oversubscription ratios, you must take shared ports out of service.
Note When restrictions on oversubscription ratios are disabled, the bandwidth allocation among the shared
ports is proportionate to the configured speed. If the configured speed is auto on Generation 2 modules,
then bandwidth is allocated assuming a speed of 4 Gbps. For example, if you have three shared ports
configured at 1, 2, and 4 Gbps, then the allocated bandwidth ratio is 1:2:4.
As of Cisco SAN-OS Release 3.0 and NX-OS Release 4.1(1) or when restrictions on oversubscription
ratios are enabled, the port bandwidths are allocated in equal proportions, regardless of port speed, so,
the bandwidth allocation for the same three ports mentioned in the example would be 1:1:1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution This feature is only supported on 48-port and 24-port 4-Gbps, and 8-Gbps Fibre Channel
switching modules.
Step 2 Select disabled from the RateModeOversubscriptionLimit drop-down list for each module for which
you want to disable restrictions on oversubscription ratios.
Step 3 Click Apply to save the changes.
To disable restrictions on oversubscription ratios on a single 48-port or 24-port 4-Gbps, or any 8-Gbps
Fibre Channel switching module using Device Manager, follow these steps:
Step 2 Click the disabled radio button to disable restrictions on oversubscription ratios.
Step 3 Click Apply to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution You must enable restrictions on oversubscription ratios before you can downgrade modules to a previous
release.
Before enabling restrictions on oversubscription ratios, ensure that you have explicitly configured shared
ports to out-of-service mode. To enable restrictions on oversubscription ratios on multiple 48-port or
24-port 4-Gbps, or any 8-Gbps Fibre Channel switching modules using Device Manager, follow these
steps:
To enable restrictions on oversubscription ratios on a single 48-port or 24-port 4-Gbps, or any 8-Gbps
Fibre Channel switching module using Device Manager, follow these steps:
Caution When you disable or enable bandwidth fairness, the change does not take effect until you reload the
module.
Note This feature is supported only on the 48-port and 24-port 4-Gbps modules, the 8-Gbps modules, and the
18/4-port Multiservice Module (MSM).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select enable from the BandwidthFairnessConfig drop-down list for each module for which you want to
enable bandwidth fairness.
Step 3 Click Apply to save the changes.
To enable bandwidth fairness on a single 48-port or 24-port 4-Gbps Fibre Channel switching module
using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you disable bandwidth fairness, up to a 20 percent increase in internal bandwidth allocation is possible
for each port group; however, bandwidth fairness is not guaranteed when there is a mix of shared and
full-rate ports in the same port group.
To disable bandwidth fairness on multiple 48-port or 24-port 4-Gbps, or 8-Gbps Fibre Channnel
switching modules using Device Manager, follow these steps:
To disable bandwidth fairness on a single 48-port or 24-port 4-Gbps, or 8-Gbps Fibre Channel switching
module using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The interface must be disabled before it can be taken out of service.
Caution Taking interfaces out of service releases all the shared resources to ensure that they are available to other
interfaces. This causes the configuration in the shared resources to revert to default when the interface
is brought back into service. Also, an interface cannot come back into service unless the default shared
resources for the port are available. The operation to free up shared resources from another port is
disruptive.
To take an interface out of service using Fabric Manager, follow these steps:
Step 1 Select a switch from the Fabric pane, or select a group of switches (SAN, fabric, VSAN) from the
Logical Domains pane.
Step 2 Expand Switches, expand Interfaces and select FC Physical in the Physical Attributes pane.
You see the FC Physical > General tab in the Information pane.
Step 3 Scroll down until you see the row containing the switch and port you want to configure.
Step 4 Scroll right (if necessary) until you see the Status Service column.
Step 5 Select in or out from the Status Service column.
Step 6 Click the Apply Changes icon.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Releasing shared resources disrupts traffic on the port. Traffic on other ports in the port group is not
affected.
To release the shared resources for a port group using Fabric Manager, follow these steps:
Step 1 Select a switch from the Fabric pane, or select a group of switches (SAN, fabric, VSAN) from the
Logical Domains pane.
Step 2 Expand Switches > Interfaces and then select FC Physical from the Physical Attributes pane.
You see the FC Physical > General tab in the Information pane.
Step 3 Scroll down until you see the row containing the switch and port you want to configure.
Step 4 Scroll right (if necessary) until you see the Status Service column (see Figure 22-17).
Step 5 Select the out status from the Status Service column.
Step 6 Click the Apply Changes icon.
Step 7 Select the in status from the Status Service column.
Step 8 Click the Apply Changes icon.
Step 1 Choose Interface > FC All and click the Diagnostics tab or hold down the Control key, and then click
each port for which you want to view diagnostic information.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Right-click the selected ports, select Configure, and click the Diagnostics tab.
You see the FC Interfaces dialog box shown in Figure 22-18.
To view diagnostic information for a single port using Device Manager, follow these steps:
Step 1 Right-click a port, select Configure, and click the Diagnostics tab.
You see the port licensing options for the selected port shown in Figure 22-19.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 22-22 lists the default settings for Generation 2 interface parameters.
Default
48-Port 4-Gbps 24-Port 4-Gbps 12-Port 4-Gbps 4-Port 10-Gbps
Parameter Switching Module Switching Module Switching Module Switching Module
Speed mode auto1 auto1 auto1 auto2
Rate mode shared shared dedicated dedicated
3
Port mode Fx Fx auto auto4
BB_credit 16 16 250 250
buffers
Performance 1455 1455
buffers
1. Auto speed mode on the 4-Gbps switching modules enables autosensing and negotiates to a maximum speed of 4 Gbps.
2. The 4-port 10-Gbps switching module only supports 10-Gbps traffic.
3. Auto port mode on the 12-port 4-Gbps switching module interfaces can operate in E port mode, TE port mode, and Fx port
mode.
4. Auto port mode on the 4-port 10-Gbps switching module interfaces can operate in E port mode, TE port mode, and F port
mode.
5. Performance buffers are shared among all ports on the module.
Table 22-23 lists the default settings for Generation 3 interface parameters.
Default
4/44-Port 8-Gbps
48-Port 8-Gbps 24-Port 8-Gbps Host-Optimized Switching
Parameter Switching Module Switching Module Module
Speed mode auto1 auto1 auto_max_4G2
Rate mode shared shared shared
Port mode Fx Fx Fx
BB_credit buffers 32 32 32
1. Auto speed mode on the 8-Gbps switching modules enables autosensing and negotiates to a maximum speed of 8 Gbps.
2. Auto_max_4G speed mode on the 4/44-port 8-Gbps switching module negotiates to a maximum speed of
4 Gbps.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 23
Configuring PortChannels
This chapter discusses the PortChannel feature provided in the switch and includes the following
sections:
About PortChannels, page 23-1
PortChannel Configuration, page 23-9
Interfaces in a PortChannel, page 23-17
PortChannel Protocols, page 23-20
Verifying the PortChannel Configuration, page 23-24
Default Settings, page 23-25
About PortChannels
PortChannels refer to the aggregation of multiple physical interfaces into one logical interface to provide
higher aggregated bandwidth, load balancing, and link redundancy (See Figure 23-1). PortChannels can
connect to interfaces across switching modules, so a failure of a switching module cannot bring down
the PortChannel link.
Switch 1 Switch 2
PortChannel A
PortChannel B
79529
PortChannel C
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PortChannels on Cisco MDS 9000 Family switches allow flexibility in configuration. Figure 23-1
illustrates three possible PortChannel configurations:
PortChannel A aggregates two links on two interfaces on the same switching module at each end of
a connection.
PortChannel B also aggregates two links, but each link is connected to a different switching module.
If the switching module goes down, traffic is not affected.
PortChannel C aggregates three links. Two links are on the same switching module at each end,
while one is connected to a different switching module on switch 2.
This section contains the following topics:
About E PortChannels, page 23-2
About F and TF PortChannels, page 23-3
About PortChanneling and Trunking, page 23-3
About Load Balancing, page 23-4
About PortChannel Modes, page 23-6
Configuration Guidelines and Restrictions, page 23-7
About E PortChannels
An E PortChannel refers to the aggregation of multiple physical Ethernet interfaces into one logical interface
to provide higher aggregated bandwidth, load balancing, and link redundancy. PortChannels can connect to
interfaces across switching modules, so a failure of a switching module cannot bring down the
PortChannel link.
A PortChannel has the following features and restrictions:
Provides a point-to-point connection over ISL (E ports) or EISL (TE ports). Multiple links can be
combined into a PortChannel.
Increases the aggregate bandwidth on an ISL by distributing traffic among all functional links in the
channel.
Load balances across multiple links and maintains optimum bandwidth utilization. Load balancing
is based on the source ID, destination ID, and exchange ID (OX ID).
Provides high availability on an ISL. If one link fails, traffic previously carried on this link is switched
to the remaining links. If a link goes down in a PortChannel, the upper protocol is not aware of it. To
the upper protocol, the link is still there, although the bandwidth is diminished. The routing tables
are not affected by link failure. PortChannels may contain up to 16 physical links and may span
multiple modules for added high availability.
Note See the Fail-Over Scenarios for PortChannels and FSPF Links section on page 32-3 for failover
scenarios.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If a Cisco MDS 9124 or 9134 switch is used as a core switch, only a nontrunking F PortChannel is
supported. Trunking is not supported on this platform when NPIV enabled.
Trunking
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Link 1
Frame 1
Frame 2
Link 2
Frame 3
SID1, DID1,
Exchange 1
Frame n
Link 1
Frame 1
Frame 2
Link 2
Frame 3
SID1, DID1,
Exchange 2
Frame n
Frame 1 Link 1
Frame 2
Frame 3 Link 2
SID2, DID2
Exchange 1
Frame n
79530
Figure 23-5 illustrates how exchange-based load balancing works. When the first frame in an exchange
is received for forwarding on an interface, link 1 is chosen by a hash algorithm. All remaining frames in
that particular exchange are sent on the same link. For exchange 1, no frame uses link 2. For the next
exchange, link 2 is chosen by the hash algorithm. Now all frames in exchange 2 use link 2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Link 1
Frame 1
Frame 2
Link 2
Frame 3
SID1, DID1,
Exchange 1
Frame n
Frame 1 Link 1
Frame 2
Link 2
Frame 3
SID1, DID1,
Exchange 2
Frame n
79531
For more information on configuring load balancing and in-order delivery features, see the About
VSANs section on page 26-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If you execute the write erase command on a 32-port switching module, and then copy a saved
configuration to the switch from a text file that contains the no system default switchport
shutdown command, you need to copy the text file to the switch again for the E ports to come up
without manual configuration.
Any (or all) full line rate port(s) in the Cisco MDS 9100 Series can be included in a PortChannel.
The host-optimized ports in the Cisco MDS 9100 Series are subject to the same PortChannel rules
as 32-port switching modules; only the first port of each group of 4 ports is included in a
PortChannel.
You can configure only the first port in each 4-port group as an E port (for example, the first
port in ports 14, the fifth port in ports 58, and so on). If the first port in the group is configured
as a PortChannel, the other three ports in each group (ports 24, 68, and so on) are not usable
and remain in the shutdown state.
If any of the other three ports are configured in a no shutdown state, you cannot configure the
first port to be a PortChannel. The other three ports continue to remain in a no shutdown state.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PortChannel Configuration
PortChannels are created with default values. You can change the default configuration just like any
other physical interface.
Figure 23-6 provides examples of valid PortChannel configurations.
1 1 1 1
2 2 2 2
Cisco MDS Cisco MDS Cisco MDS Cisco MDS
Switch A 3 3 Switch B Switch A 3 3 Switch B
4 4 4 4
120480
Channel Group 1 Channel Group 2
Figure 23-7 provides examples of invalid configurations. Assuming that the links are brought up in the
1, 2, 3, 4 sequence, links 3 and 4 will be operationally down as the fabric is misconfigured.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
1 1 1 1
2 2 2 2
Cisco MDS Cisco MDS Cisco MDS Cisco MDS
Switch A 3 3 Switch B Switch A 3 3 Switch B
X X
4 4 4 4
X X
1 1
Cisco MDS
Switch B
2 2
Cisco MDS
Switch A
3 3
X Cisco MDS
Switch C
4 4
X
120488
This section shows how to configure and modify PortChannels and contains the following topics:
About PortChannel Configuration, page 23-10
Configuring PortChannels Using the Wizard, page 23-11
About PortChannel Modes, page 23-6
About PortChannel Deletion, page 23-16
Deleting PortChannels, page 23-16
Note On switches with Generation 1 switching modules, or a combination of Generation 1 and Generation 2
switching modules, you can configure a maximum of 128 PortChannels. On switches with only
Generation 2 switching modules, or Generation 2 and Generation 3 switching modules, you can
configure a maximum of 256 PortChannels.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If you misconfigure PortChannels, you may receive a misconfiguration message. If you receive this
message, the PortChannels physical links are disabled because an error has been detected.
A PortChannel error is detected if the following requirements are not met:
Each switch on either side of a PortChannel must be connected to the same number of interfaces.
Each interface must be connected to a corresponding interface on the other side (see Figure 23-7 for
an example of an invalid configuration).
Links in a PortChannel cannot be changed after the PortChannel is configured. If you change the
links after the PortChannel is configured, be sure to reconnect the links to interfaces within the
PortChannel and reenable the links.
If all three conditions are not met, the faulty link is disabled.
Step 1 Click the PortChannel Wizard icon in the toolbar (see Figure 23-8).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 (Optional) Check the Dynamically form Port Channel Group from selected ISLs check box if you
want to dynamically create the PortChannel and make the ISL properties identical for the Admin, Trunk,
Speed, and VSAN attributes.
Step 6 Click Next.
Step 7 If you chose to dynamically form a PortChannel from selected ISLs, you see the final PortChannel
Wizard screen (see Figure 23-11). Set the VSAN List, Trunk Mode, and Speed and proceed to Step 11.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 8 If you did not choose to dynamically form a PortChannel, you see the third PortChannel Wizard dialog
box(see Figure 23-12).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand ISLs and then select Port Channels in the Physical Attributes pane.
You see the PortChannels configured in the Information pane.
Step 2 Click the Protocols tab, and then from the Mode drop-down menu, select the appropriate mode for the
Port Channel.
Step 3 Click the Apply Changes icon to save any modifications.
Deleting PortChannels
To delete a PortChannel using the PortChannel Wizard in Fabric Manager, follow these steps:
Step 1 Click the PortChannel Wizard icon in the toolbar (see Figure 23-13).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click Next. You see an editable list of associated ISLs and available ISLs for this PortChannel.
Step 4 Click each associated ISL and click the left arrow to remove all ISLs from the PortChannel.
Step 5 Check the Delete Port Channel If Empty check box to delete this PortChannel.
Step 6 Click Finish to save any modifications or click Cancel to discard any changes.
Interfaces in a PortChannel
You can add or remove a physical interface (or a range of interfaces) to an existing PortChannel. The
compatible parameters on the configuration are mapped to the PortChannel. Adding an interface to a
PortChannel increases the channel size and bandwidth of the PortChannel. Removing an interface from
a PortChannel decreases the channel size and bandwidth of the PortChannel.
This section describes interface configuration for a PortChannel and includes the following topics:
About Interface Addition to a PortChannel, page 23-17
Adding an Interface to a PortChannel, page 23-18
Forcing an Interface Addition, page 23-19
About PortChannel Deletion, page 23-16
Deleting an Interface from a PortChannel, page 23-20
Compatibility Check
A compatibility check ensures that the same parameter settings are used in all physical ports in the
channel. Otherwise, they cannot become part of a PortChannel. The compatibility check is performed
before a port is added to the PortChannel.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The check ensures that the following parameters and settings match at both ends of a PortChannel:
Capability parameters (type of interface, Gigabit Ethernet at both ends, or Fibre Channel at both
ends).
Administrative compatibility parameters (speed, mode, rate mode, port VSAN, allowed VSAN list,
and port security).
Note Ports in shared rate mode can also form a PortChannel or a trunking PortChannel.
Note By default, the CLI adds a interface normally to a PortChannel, while the Fabric Manager adds the
interface by force, unless specified explicitly.
To add an interface or range of interfaces to a PortChannel using Fabric Manager, follow these steps:
Step 1 Expand ISLs and then select Port Channels in the Physical Attributes pane.
You see the PortChannels configured in the Information pane (see Figure 23-14).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the Channels tab and find the switch and PortChannel that you want to edit.
Step 3 Set Members Admin to the interface or list of interfaces that you want to add to the PortChannel.
Step 4 Click the Apply Changes icon to save any modifications or click Undo Changes to discard any changes.
Note When PortChannels are created from within an interface, the force option cannot be used.
After the members are forcefully added, regardless of the mode (ACTIVE and ON) used, the ports at
either end are gracefully brought down, indicating that no frames are lost when the interface is going
down (see the 32-Port Switching Module Configuration Guidelines section on page 17-3).
To force the addition of a port to a PortChannel using Fabric Manager, follow these steps:
Step 1 Expand ISLs and then select Port Channels in the Physical Attributes pane. You see the PortChannels
configured in the Information pane.
Step 2 Click the Channels tab and find the switch and PortChannel that you want to edit.
Step 3 Set Members Admin to the interface or list of interfaces that you want to add to the PortChannel.
Step 4 Check the Force check box to force this interface addition.
Step 5 Click the Apply Changes icoon to save any modifications.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand ISLs and then select Port Channels in the Physical Attributes pane.
You see the PortChannels configured in the Information pane.
Step 2 Click the Channels tab and find the switch and PortChannel that you want to edit.
Step 3 Remove the interface or list of interfaces you want deleted in the Members the Admin column.
Step 4 Click the Apply Changes icon to save any modifications.
PortChannel Protocols
In earlier Cisco SAN-OS releases, PortChannels required additional administrative tasks to support
synchronization. The Cisco NX-OS software provides robust error detection and synchronization
capabilities. You can manually configure channel groups or they can be automatically created. In both
cases, the channel groups have the same capability and configurational parameters. Any change in
configuration applied to the associated PortChannel interface is propagated to all members of the
channel group.
A protocol to exchange PortChannel configurations is available in all Cisco MDS switches. This addition
simplifies PortChannel management with incompatible ISLs. An additional autocreation mode enables
ISLs with compatible parameters to automatically form channel groups without manual intervention.
The PortChannel protocol is enabled by default.
The PortChannel protocol expands the PortChannel functional model in Cisco MDS switches. It uses the
exchange peer parameters (EPP) services to communicate across peer ports in an ISL. Each switch uses
the information received from the peer ports along with its local configuration and operational values to
decide if it should be part of a PortChannel. The protocol ensures that a set of ports are eligible to be
part of the same PortChannel. They are only eligible to be part of the same port channel if all the ports
have a compatible partner.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Channel groups are not supported on internal ports in the Cisco Fabric Switch for HP c-Class
BladeSystem and the Cisco Fabric Switch for IBM BladeSystem.
Assuming link A1-B1 comes up first in Figure 23-15, that link is operational as an individual link.When
the next link, say A2-B2 comes up, the PortChannel protocol identifies if this link is compatible with
link A1-B1 and automatically creates channel groups 10 and 20 in the respective switches. If link A3-B3
can join the channel groups (the PortChannels), the respective ports have compatible configurations. If
link A4-B4 operates as an individual link, it is because of the incompatible configuration of the two end
ports with the other member ports in this channel group.
po10 po20
1 1
2 2
Cisco MDS Cisco MDS
Switch A Switch B
3 3
4 4
120489
The channel group numbers are selected dynamically, and as such, the administrative configuration of
the ports forming the channel group at either end are applicable to the newly created channel group. The
channel group number being chosen dynamically may be different across reboots for the same set of
PortChannels based on the order of ports that are initialized in the switch.
Table 23-2 identifies the differences between user-configured and auto-configured channel groups.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Autocreation is not supported as of MDS NX-OS Release 4.1(1b) and later.
About Autocreation
The autocreation protocol has the following functionality:
A port is not allowed to be configured as part of a PortChannel when the autocreation feature is
enabled. These two configurations are mutually exclusive.
Autocreation must be enabled in both the local and peer ports to negotiate a PortChannel.
Aggregation occurs in one of two ways:
A port is aggregated into a compatible autocreated PortChannel.
A port is aggregated with another compatible port to form a new PortChannel.
Newly created PortChannels are allocated from the maximum possible PortChannel (128 for
Generation 1 or a combination of Generation 1 and Generation 2 switches, or 256 for Generation 2
switches) in a decreasing order based on availability. If all 128 (or 256) numbers are used up,
aggregation is not allowed.
You cannot change the membership or delete an autocreated PortChannel.
When you disable autocreation, all member ports are removed from the autocreated PortChannel.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Once the last member is removed from an autocreated PortChannel, the channel is automatically
deleted and the number is released for reuse.
An autocreated PortChannel is not persistent through a reboot. An autocreated PortChannel can be
manually configured to appear the same as a persistent PortChannel. Once the PortChannel is made
persistent, the autocreation feature is disabled in all member ports.
You can enable or disable the autocreation feature on a per-port basis or for all ports in the switch.
When this configuration is enabled, the channel group mode is assumed to be active. The default for
this task is disabled.
If autocreation of channel groups is enabled for an interface, you must first disable autocreation
before downgrading to earlier software versions or before configuring the interface in a manually
configured channel group.
Tip When enabling autocreation in any switch in the Cisco MDS 9000 Family, we recommend that you retain
at least one interconnected port between the switches without any autocreation configuration. If all ports
between two switches are configured with the autocreation feature at the same time, you may face a
possible traffic disruption between these two switches as the ports are automatically disabled and
reenabled when ports are added to an autocreated PortChannel.
Tip If you enable persistence, be sure to enable it at both ends of the PortChannel.
Step 1 Expand ISLs and then select Port Channels in the Physical Attributes pane. Click the Protocol tab.
You see the switch protocols as shown in Figure 23-16.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Check the Persist check box for each channel that you want to convert to a manually configured channel
group.
Step 3 Click the Apply Changes icon to save any modifications.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 23-3 lists the default settings for PortChannels.
Parameters Default
PortChannels FSPF is enabled by default.
Create PortChannel Administratively up.
Default PortChannel mode ON mode on non-NPV and NPIV core switches.
ACTIVE mode on NPV switches.
Autocreation Disabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 24
Configuring Trunking
This chapter describes the trunking feature provided in Cisco MDS 9000 switches. It includes the
following sections:
About Trunking, page 24-1
Trunking Guidelines and Restrictions, page 24-3
Configuring Trunk Mode and VSAN List, page 24-7
Example F Port Trunking Configuration, page 16-13
Default Settings, page 24-11
About Trunking
Trunking, also known as VSAN trunking, is a feature specific to switches in the Cisco MDS 9000
Family. Trunking enables interconnect ports to transmit and receive frames in more than one VSAN, over
the same physical link. Trunking is supported on E ports and F ports. (See Figure 24-1 and Figure 24-2).
This section includes the following topics:
Trunking E Ports, page 24-2
Trunking F Ports, page 24-2
Key Concepts, page 24-3
Trunking Misconfiguration Examples, page 24-4
Upgrade and Downgrade Restrictions, page 24-5
Difference Between TE Ports and TF-TNP Ports, page 24-5
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Trunking E Ports
Trunking the E ports enables interconnect ports to transmit and receive frames in more than one VSAN,
over the same physical link, using enhanced ISL (EISL) frame format.
79938
Trunking
Note Trunking is not supported by internal ports on both the Cisco Fabric Switch for HP c_Class BladeSystem
and the Cisco Fabric Switch for IBM BladeCenter.
Trunking F Ports
Trunking F ports allows interconnected ports to transmit and receive tagged frames in more than one
VSAN, over the same physical link. Figure 24-2 represents the possible trunking scenarios in a SAN
with MDS core switches, NPV switches, third-party core switches, and HBAs.
5 NP TNP TNP
N TN
192090
HB A HB A
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Key Concepts
The trunking feature includes the following key concepts:
TE portIf trunk mode is enabled in an E port and that port becomes operational as a trunking E
port, it is referred to as a TE port.
TF portIf trunk mode is enabled in an F port (see the link 2 in Figure 24-2) and that port becomes
operational as a trunking F port, it is referred to as a TF port.
TN portIf trunk mode is enabled (not currently supported) in an N port (see the link 1b in
Figure 24-2) and that port becomes operational as a trunking N port, it is referred to as a TN port.
TNP portIf trunk mode is enabled in an NP port (see the link 2 in Figure 24-2) and that port
becomes operational as a trunking NP port, it is referred to as a TNP port.
TF PortChannelIf trunk mode is enabled in an F PortChannel (see the link 4 in Figure 24-2) and
that PortChannel becomes operational as a trunking F PortChannel, it is referred to as TF
PortChannel. Cisco Port Trunking Protocol (PTP) is used to carry tagged frames.
TF-TN port linkA single link can be established to connect an F port to an HBA to carry tagged
frames (see the link 1a and 1b in Figure 24-2) using Exchange Virtual Fabrics Protocol (EVFP). A
server can reach multiple VSANs through a TF port without inter-VSAN routing (IVR).
TF-TNP port linkA single link can be established to connect an TF port to an TNP port using the
PTP protocol to carry tagged frames (see the link 2 in Figure 24-2). PTP is used because PTP also
supports trunking PortChannels.
Note The TF-TNP port link between a third-party NPV core and a Cisco NPV switch is
established using the EVFP protocol.
A Fibre Channel VSAN is called Virtual Fabric and uses a VF_ID in place of the VSAN ID. By
default, the VF_ID is 1 for all ports. When an N port supports trunking, a PWWN is defined for each
VSAN and called as logical PWWN. In the case of MDS core switches, the PWWNs for which the
N port requests additional FC_IDs are called virtual PWWNs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switch 1 Switch 2
Isolated
E port E port
VSAN 2 VSAN 3
85471
VSAN mismatch
In this example, the trunking protocol detects potential VSAN merging and isolates the ports involved.
The trunking protocol cannot detect merging of VSANs when a third-party switch is placed in between
two Cisco MDS 9000 Family switches (see Figure 24-4).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Third-party switches
VSAN 2 VSAN 3
E port E port
85472
Switch 1 Switch 2 Switch 3
VSAN 2 and VSAN 3 are effectively merged with overlapping entries in the name server and the zone
applications. The Cisco MDS 9000 Fabric Manager helps detect such topologies.
If you have created VSAN 4079, the upgrade to NX-OS Release 4.1(3a) will have no affect onVSAN
4079.
If you downgrade after NX-OS Release 4.1(3a) creates VSAN 4079 and reserves it for EVFP use,
the VSAN will no longer be reserved.
Note In case of TF or TNP ports, the Device Manager will show port status in Amber even after port is up and
there is no failure. It will be changed to green once all the VSAN has successful logins.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
By default, the trunking protocol is enabled. If the trunking protocol is disabled on a switch, no port on
that switch can apply new trunk configurations. Existing trunk configurations are not affected. The TE
port continues to function in trunk mode, but only supports traffic in VSANs that it negotiated with
previously (when the trunking protocol was enabled). Also, other switches that are directly connected to
this switch are similarly affected on the connected interfaces. In some cases, you may need to merge
traffic from different port VSANs across a non-trunking ISL. If so, disable the trunking protocol.
Note We recommend that both ends of a trunking link belong to the same port VSAN. On certain switches or
fabric switches where the port VSANs are different, one end returns an error and the other end is not
connected.
Tip To avoid inconsistent configurations, shut all ports before enabling or disabling the trunking protocols.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The trunking protocols must be enabled to support trunking, and NPIV must be enabled on the core
switch to activate a TF-TNP link.
To enable or disable the F port trunking and channeling protocols using the Fabric Manager, follow these
steps:
Step 1 From the Physical Interfaces panel, expand Switches and then select F_Port_Channel/Trunk.
You see the list of switches in the Fabric with F port trunking and channeling enabled.
Step 2 From the Status column, select enable or disable.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip The preferred configuration on the Cisco MDS 9000 Family switches is one side of the trunk set to auto
and the other side set to on.
Note When connected to a third-party switch, the trunk mode configuration on E ports has no effect. The ISL
is always in a trunking disabled state. In the case of F ports, if the third-party core switch ACC's physical
FLOGI with the EVFP bit is configured, then EVFP protocol enables trunking on the link.
Step 1 Expand Interfaces and then select FC Physical. You see the interface configuration in the Information
pane.
Step 2 Click the Trunk Config tab to modify the trunking mode for the selected interface.
You see the information shown in Figure 24-5.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If the VF_ID of the F port and the N port do not match, then no tagged frames can be exchanged.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switch 2
VSAN1
VSAN2
al. VSAN3
ration
re ope
3a
79945
VSAN4
VSAN5
You can configure a select set of VSANs (from the allowed-active list) to control access to the VSANs
specified in a trunking ISL.
Using Figure 24-7 as an example, you can configure the list of allowed VSANs on a per-interface basis
(see Figure 24-8). For example, if VSANs 2 and 4 are removed from the allowed VSAN list of ISLs
connecting to switch 1, the operational allowed list of VSANs for each ISL would be as follows:
The ISL between switch 1 and switch 2 includes VSAN 1 and VSAN 3.
The ISL between switch 2 and switch 3 includes VSAN 1 and VSAN 2.
The ISL between switch 3 and switch 1 includes VSAN 1, 2, and 5.
Consequently, VSAN 2 can only be routed from switch 1 through switch 3 to switch 2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switch 2
VSAN1
list.
wed VSAN2
llo . VSAN3
ea nal
o n th eratio
79946
VSAN4
VSAN5
Default Settings
Table 24-4 lists the default settings for trunking parameters.
Parameters Default
Switch port trunk mode ON on non-NPV and MDS core switches.
OFF on NPV switches.
Allowed VSAN list 1 to 4093 user-defined VSAN IDs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
Allowed VF-ID list 1 to 4093 user-defined VF-IDs.
Trunking protocol (E ports) Enabled.
F port trunking protocol Disabled
CH A P T E R 25
Configuring Domain Parameters
The Fibre Channel domain (fcdomain) feature performs principal switch selection, domain ID
distribution, FC ID allocation, and fabric reconfiguration functions as described in the FC-SW-2
standards. The domains are configured on a per VSAN basis. If you do not configure a domain ID, the
local switch uses a random ID.
Caution Changes to fcdomain parameters should not be performed on a daily basis. These changes should be
made by an administrator or individual who is completely familiar with switch operations.
Tip When you change the configuration, be sure to save the running configuration. The next time you reboot
the switch, the saved configuration is used. If you do not save the configuration, the previously saved
startup configuration is used.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switch 2 (principal)
Local WWN
20:01:ab:ba:cd:dc:f4:00
Switch 99 (subordinate)
79953
99.1.1
Note Domain IDs and VSAN values used in all procedures are only provided as examples. Be sure to use IDs
and values that apply to your configuration.
This section describes the fcdomain feature and includes the following topics:
About Domain Restart, page 25-3
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note A static domain is specifically configured by the user and may be different from the runtime domain. If
the domain IDs are different, the runtime domain ID changes to take on the static domain ID after the
next restart, either disruptive or nondisruptive.
Tip If a VSAN is in interop mode, you cannot restart the fcdomain for that VSAN disruptively.
You can apply most of the configurations to their corresponding runtime values. Each of the following
sections provide further details on how the fcdomain parameters are applied to the runtime values.
Restarting a Domain
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To restart the fabric disruptively or nondisruptively using Fabric Manager, follow these steps:
Step 1 Expand Fabricxx > VSANxx and then select Domain Manager in the Logical Domains pane for the
fabric and VSAN that you want to restart.
You see the Running tab configuration of the domain in the Information pane.
Step 3 Set the Restart drop-down menu to disruptive or nonDisruptive for any switch in the fabric that you
want to restart the fcdomain.
Step 4 Click the Apply Changes icon to issue this fcdomain restart.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Fabricxx > VSANxx and then select Domain Manager in the Logical Domains pane for the
fabric and VSAN that you want to set the principal switch priority for.
You see the domains running configuration in the Information pane shown in Figure 25-4.
Step 2 Set Priority to a high value for the switch in the fabric that you want to be the principal switch.
Step 3 Click the Apply Changes icon to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Fabricxx > VSANxx and then select Domain Manager in the Logical Domains pane for the
fabric and VSAN that you want to disable fcdomain for.
You see the domains running configuration in the Information pane.
Step 2 Click the Configuration tab and uncheck the Enable check box (see Figure 25-5) for each switch in the
fabric that you want to disable fcdomain on.
Step 1 Expand Fabricxx > VSANxx and then select Domain Manager in the Logical Domains pane for the
fabric and VSAN that you want to set the fabric name for.
You see the running configuration of the domain in the Information pane.
Step 2 Click the Configuration tab and set the fabric name for each switch in the fabric.
Step 3 Click the Apply Changes icon to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Interfaces and then select FC Physical in the Physical Attributes pane.
You see the Fibre Channel configuration in the Information pane.
Step 2 Click the Domain Mgr tab.
You see the information in Figure 25-6.
Step 3 Check the RcfReject check box for each interface that you want to reject RCF request frames on.
Step 4 Click the Apply Changes icon to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Enabling Autoreconfiguration
To enable automatic reconfiguration in a specific VSAN (or range of VSANs) using Fabric Manager,
follow these steps:
Step 1 Expand Fabricxx > VSANxx and then select Domain Manager in the Logical Domains pane for the
fabric and VSAN that you want to enable automatic reconfiguration for.
You see the running configuration of the domain in the Information pane.
Step 2 Select the Configuration tab and check the Auto Reconfigure check box for each switch in the fabric
that you want to automatically reconfigure.
Step 3 Click the Apply Changes icon to save these changes.
Domain IDs
Domain IDs uniquely identify a switch in a VSAN. A switch may have different domain IDs in different
VSANs. The domain ID is part of the overall FC ID.
This section describes how to configure domain IDs and includes the following topics:
About Domain IDs, page 25-8
Specifying Static or Preferred Domain IDs, page 25-10
About Allowed Domain ID Lists, page 25-11
Configuring Allowed Domain ID Lists, page 25-11
About CFS Distribution of Allowed Domain ID Lists, page 25-12
Enabling Distribution, page 25-12
Locking the Fabric, page 25-13
Committing Changes, page 25-13
Discarding Changes, page 25-13
Clearing a Fabric Lock, page 25-14
Displaying Pending Changes, page 25-14
Displaying Session Status, page 25-15
About Contiguous Domain ID Assignments, page 25-15
Enabling Contiguous Domain ID Assignments, page 25-15
Note The 0 (zero) value can be configured only if you use the preferred option.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If you do not configure a domain ID, the local switch sends a random ID in its request. We recommend
that you use static domain IDs.
When a subordinate switch requests a domain, the following process takes place (see Figure 25-7):
1. The local switch sends a configured domain ID request to the principal switch.
2. The principal switch assigns the requested domain ID if available. Otherwise, it assigns another
available domain ID.
79954
Switch 7 (subordinate) Switch 2 (principal)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If the configured type is preferred, the local switch accepts the domain ID assigned by the
principal switch and the assigned domain ID becomes the runtime domain ID.
If you change the configured domain ID, the change is only accepted if the new domain ID is included
in all the allowed domain ID lists currently configured in the VSAN. Alternatively, you can also
configure zero-preferred domain ID.
Tip When the FICON feature is enabled in a given VSAN, the domain ID for that VSAN remains in the static
state. You can change the static ID value but you cannot change it to the preferred option.
Note In an IVR without NAT configuration, if one VSAN in the IVR topology is configured with static domain
IDs, then the other VSANs (edge or transit) in the topology should also be configured with static domain
IDs.
In an IVR NAT configuration, if one VSAN in the IVR topology is configured with static domain IDs,
then the IVR domains that can be exported to that VSAN must also be assigned static domains.
Caution You must restart the fcdomainif you want to apply the configured domain changes to the runtime
domain.
Note If you have configured an allow domain ID list, the domain IDs that you add must be in that range for
the VSAN. See the About Allowed Domain ID Lists section on page 25-11.
Note Within a VSAN all switches should have the same domain ID type (either static or preferred). If a
configuration is mixed (some switches with static domain types and others with preferred) then you may
experience link isolation.
To specify a static or preferred domain ID using Fabric Manager, follow these steps:
Step 1 Expand Fabricxx > VSANxx and then select Domain Manager in the Logical Domains pane for the
fabric and VSAN that you want to configure the domain ID for.
You see the running configuration of the domain in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Enter a value for the Config DomainID and click static or preferred from the Config Type drop-down
menu to set the domain ID for switches in the fabric.
Step 3 Click the Apply Changes icon to save these changes.
Tip If you configure an allowed list on one switch in the fabric, we recommend you configure the same list
in all other switches in the fabric to ensure consistency or use CFS to distribute the configuration.
Step 1 Expand Fabricxx > VSANxx > Domain Manager and then select Allowed in the Logical Domains pane
for the fabric and VSAN for which you want to set the allowed domain ID list.
You see the CFS configuration in the Information pane (see Figure 25-8).
Step 2 Set the Admin drop-down menu to enable and set the Global drop-down menu to enable.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click Apply Changes to enable CFS distribution for the allowed domain ID list.
Step 4 Select the Allowed DomainIds tab.
You see the Allowed Domain ID screen shown in Figure 25-9.
Step 5 Set the list to the allowed domain IDs list for this domain.
Step 6 Select the CFS tab and set Config Action to commit.
Step 7 Click the Apply Changes icon to commit this allowed domain ID list and distribute it throughout the
VSAN.
Note All switches in the fabric must be running Cisco SAN-OS Release 3.0(1) or later to distribute the allowed
domain ID list using CFS.
Use CFS to distribute the allowed domain ID list to ensure consistency in the allowed domain ID lists
on all switches in the VSAN.
Note We recommend configuring the allow domain ID list and committing it on the principle switch.
For more information about CFS, see Chapter 13, Using the CFS Infrastructure.
Enabling Distribution
CFS distribution of allowed domain ID lists is disabled by default. You must enable distribution on all
switches to which you want to distribute the allowed domain ID lists.
To enable (or disable) allowed domain ID list configuration distribution using Fabric Manager, follow
these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Fabricxx > VSANxx > Domain Manager and then select Allowed in the Logical Domains pane
for the fabric and VSAN that you want to set the allowed domain ID list for.
You see the CFS configuration in the Information pane.
Step 2 Set the Admin drop-down menu to enable and the Global drop-down menu to enable to enable CFS
distribution for the allowed domain ID list.
Step 3 Click the Apply Changes icon to enable CFS distribution for the allowed domain ID list.
Committing Changes
To apply the pending domain configuration changes to other MDS switches in the VSAN, you must
commit the changes. The pending configuration changes are distributed and, on a successful commit, the
configuration changes are applied to the active configuration in the MDS switches throughout the VSAN
and the fabric lock is released.
To commit pending domain configuration changes and release the lock using Fabric Manager, follow
these steps:
Step 1 Expand Fabricxx > VSANxx > Domain Manager and then select Allowed in the Logical Domains pane
for the fabric and VSAN that you want to set the allowed domain ID list for.
You see the CFS configuration in the Information pane.
Step 2 Set the Config Action drop-down menu to commit.
Step 3 Click the Apply Changes icon to commit the allowed domain ID list and distribute it throughout the
VSAN.
Discarding Changes
At any time, you can discard the pending changes to the domain configuration and release the fabric lock.
If you discard (abort) the pending changes, the configuration remains unaffected and the lock is released.
To discard pending domain configuration changes and release the lock using Fabric Manager, follow
these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Fabricxx > VSANxx > Domain Manager and then select Allowed in the Logical Domains pane
for the fabric and VSAN that you want to set the allowed domain ID list for.
You see the CFS configuration in the Information pane.
Step 2 Set the Config Action drop-down menu to abort.
Step 3 Click the Apply Changes icon to discard any pending changes to the allowed domain ID list.
Tip The pending changes are only available in the volatile directory and are discarded if the switch is
restarted.
Step 1 Expand Fabricxx > VSANxx > Domain Manager and then select AllowedId in the Logical Domains
pane for the fabric and VSAN for which you want the allowed domain ID list.
You see the CFS configuration in the Information pane.
Step 2 Set the Config Action drop-down menu to clear.
Step 3 Click the Apply Changes icon to clear the fabric lock.
Step 1 Expand Fabricxx > VSANxx > Domain Manager > Allowed in the Logical Domains pane for the fabric
and VSAN that you want to set the allowed domain ID list for.
You see the CFS configuration in the Information pane.
Step 2 Set the Config View As drop-down menu to pending.
Step 3 Click the Apply Changes icon to clear the fabric lock.
Step 4 Click the AllowedDomainIds tab.
You see the pending configuration for the allowed domain IDs list.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Fabricxx > VSANxx > Domain Manager and then select Allowed in the Logical Domains pane
for the fabric and VSAN for which you want to set the allowed domain ID list.
Step 2 View the CFS configuration and session status in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To enable contiguous domains in a specific VSAN (or a range of VSANs) using Fabric Manager, follow
these steps:
Step 1 Expand Fabricxx > VSANxx and then select Domain Manager in the Logical Domains pane for the
fabric and VSAN that you want to enable contiguous domains for.
You see the running configuration of the domain in the Information pane.
Step 2 Click the Configuration tab and check the Contiguous Allocation check box for each switch in the
fabric that will have contiguous allocation.
Step 3 Click the Apply Changes icon to save these changes.
FC IDs
When an N or NL port logs into a Cisco MDS 9000 Family switch, it is assigned an FC ID. By default,
the persistent FC ID feature is enabled. If this feature is disabled, the following consequences apply:
An N or NL port logs into a Cisco MDS 9000 Family switch. The WWN of the requesting N or NL
port and the assigned FC ID are retained and stored in a volatile cache. The contents of this volatile
cache are not saved across reboots.
The switch is designed to preserve the binding FC ID to the WWN on a best-effort basis. For
example, if one N port disconnects from the switch and its FC ID is requested by another device,
this request is granted and the WWN with the initial FC ID association is released.
The volatile cache stores up to 4000 entries of WWN to FC ID binding. If this cache is full, a new
(more recent) entry overwrites the oldest entry in the cache. In this case, the corresponding WWN
to FC ID association for the oldest entry is lost.
The switch connection behavior differs between N ports and NL ports:
N ports receive the same FC IDs if disconnected and reconnected to any port within the same
switch (as long as it belongs to the same VSAN).
NL ports receive the same FC IDs only if connected back to the same port on the switch to which
they were originally connected.
This section describes configuring FC IDs and includes the following topics:
About Persistent FC IDs, page 25-17
Enabling the Persistent FC ID Feature, page 25-17
About Persistent FC ID Configuration, page 25-17
Configuring Persistent FC IDs, page 25-18
About Unique Area FC IDs for HBAs, page 25-19
Configuring Unique Area FC IDs for an HBA, page 25-19
About Persistent FC ID Selective Purging, page 25-21
Purging Persistent FC IDs, page 25-21
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you connect to the switch from an AIX or HP-UX host, be sure to enable the persistent FC ID feature
in the VSAN that connects these hosts.
Note FC IDs are enabled by default. This change of default behavior from releases prior to Cisco MDS
SAN-OS Release 2.0(1b) prevents FC IDs from being changed after a reboot. You can disable this option
for each VSAN.
A persistent FC ID assigned to an F port can be moved across interfaces and can continue to maintain
the same persistent FC ID.
Note Persistent FC IDs with loop-attached devices (FL ports) need to remain connected to the same port in
which they were configured.
Note Due to differences in Arbitrated Loop Physical Address (ALPA) support on devices, FC ID persistency
for loop-attached devices is not guaranteed.
Step 1 Expand Fabricxx > VSANxx and then select Domain Manager in the Logical Domains pane for the
fabric and VSAN that you want to enable the Persistent FC ID feature for.
You see the running configuration of the domain in the Information pane.
Step 2 Select the Persistent Setup tab and check the enable check box for each switch in the fabric that will
have persistent FC ID enabled.
Step 3 Click the Apply Changes icon to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Ensure that the required VSAN is an active VSANpersistent FC IDs can only be configured on
active VSANs.
Verify that the domain part of the FC ID is the same as the runtime domain ID in the required VSAN.
If the software detects a domain mismatch, the command is rejected.
Verify that the port field of the FC ID is 0 (zero) when configuring an area.
Note FICON uses a different scheme for allocating FC IDs based in the front panel port number. This scheme
takes precedence over FC ID persistence in FICON VSANs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Fabricxx > VSANxx and then select Domain Manager in the Logical Domains pane for the
fabric and VSAN that you want to configure the Persistent FC ID list for.
You see the running configuration of the domain in the Information pane.
Step 2 Click the Persistent FcIds tab and click Create Row.
You see the Create Persistent FC IDs dialog box shown in Figure 25-10.
Step 3 Select the switch, WWN, and FC ID that you want to make persistent.
Step 4 Set the Mask radio button to single or area.
Step 5 Set the Assignment radio button to static or dynamic.
Step 6 Click the Apply Changes icon to save these changes.
Note Only read this section if the HBA port and the storage port are connected to the same switch.
Some HBA ports require a different area ID than storage ports when they are both connected to the same
switch. For example, if the storage port FC ID is 0x6f7704, the area for this port is 77. In this case, the
HBA ports area can be anything other than 77. The HBA ports FC ID must be manually configured to
be different from the storage ports FC ID.
Switches in the Cisco MDS 9000 Family facilitate this requirement with the FC ID persistence feature.
You can use this feature to preassign an FC ID with a different area to either the storage port or the HBA
port. The procedure in this example uses a switch domain of 111(6f hex). The HBA port connects to
interface fc1/9 and the storage port connects to interface fc 1/10 in the same switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand End Device in the Physical Attributes pane and select the FLOGI tab in the Information pane
to obtain the port WWN (Port Name field) of the HBA (see Figure 25-11.
Note Both FC IDs in this setup have the same area 00 assignment.
Step 2 Expand Switches > Interfaces and then select FC Physical from the Physical Attributes pane.
Step 3 Set the Status Admin drop-down menu to down for the interface that the HBA is connected to.
This shuts down the HBA interface in the MDS switch.
Step 4 Expand Fabricxx > VSANxx and then select Domain Manager.
Step 5 Click the Persistent Setup tab in the Information pane to verify that the FC ID feature is enabled (see
Figure 25-12).
If this feature is disabled, continue with this procedure to enable persistent FC ID.
If this feature is already enabled, skip to Step 7.
Step 6 Check the Enable check box to enable the persistent FC ID feature in the Cisco MDS switch (see
Figure 25-13).
Step 7 Select the Persistent FcIds tab and assign a new FC ID with a different area allocation in the FcId field.
In this example, we replace 00 with ee (see Figure 25-13).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 10 EXpand Switches > Interfaces and then select FC Physical from the Physical Attributes pane. Set the
Status Admin drop-down menu to up for the interface that the HBA is connected to.
Step 11 This enables the HBA interface in the MDS switch.
Step 1 Expand Fabricxx > All VSANs > Domain Manager in the Logical Domains pane for the fabric that you
want to purge the Persistent FC IDs for. You see the running configuration of the domain in the
Information pane.
Step 2 Click the Persistent Setup tab.
You see the persistent FC ID setup in the Information pane shown in Figure 25-14.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Check the Purge check box for the switch that you want to purge persistent FC IDs on (see
Figure 25-14).
Step 4 Click the Apply Changes icon to save these changes.
Step 1 Expand Fabricxx > All VSANs and then select Domain Manager in the Logical Domains pane for the
fabric that you want to display statistics for.
You see the running configuration of the domain in the Information pane.
Step 2 Click the Statistics tab. You see the FC ID statistics in the Information pane.
Default Settings
Table 25-2 lists the default settings for all fcdomain parameters.
Parameters Default
fcdomain feature Enabled.
Configured domain ID 0 (zero).
Configured domain Preferred.
autoreconfigure option Disabled.
contiguous-allocation option Disabled.
Priority 128.
Allowed list 1 to 239.
Fabric name 20:01:00:05:30:00:28:df.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
rcf-reject Disabled.
Persistent FC ID Enabled.
Allowed domain ID list configuration distribution Disabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PA R T 4
Fabric Configuration
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 26
Configuring and Managing VSANs
You can achieve higher security and greater stability in Fibre Channel fabrics by using virtual SANs
(VSANs) on Cisco MDS 9000 Family switches and Cisco Nexus 5000 Series switches. VSANs provide
isolation among devices that are physically connected to the same fabric. With VSANs you can create
multiple logical SANs over a common physical infrastructure. Each VSAN can contain up to 239
switches and has an independent address space that allows identical Fibre Channel IDs (FC IDs) to be
used simultaneously in different VSANs. This chapter includes the following sections:
About VSANs, page 26-1
VSAN Configuration, page 26-5
Default Settings, page 26-14
About VSANs
A VSAN is a virtual storage area network (SAN). A SAN is a dedicated network that interconnects hosts
and storage devices primarily to exchange SCSI traffic. In SANs you use the physical links to make these
interconnections. A set of protocols run over the SAN to handle routing, naming, and zoning. You can
design multiple SANs with different topologies.
This section describes VSANs and includes the following topics:
VSANs Topologies, page 26-1
VSAN Advantages, page 26-3
VSANs Versus Zones, page 26-4
VSANs Topologies
With the introduction of VSANs, the network administrator can build a single topology containing
switches, links, and one or more VSANs. Each VSAN in this topology has the same behavior and
property of a SAN. A VSAN has the following additional features:
Multiple VSANs can share the same physical topology.
The same Fibre Channel IDs (FC IDs) can be assigned to a host in another VSAN, thus increasing
VSAN scalability.
Every instance of a VSAN runs all required protocols such as FSPF, domain manager, and zoning.
Fabric-related configurations in one VSAN do not affect the associated traffic in another VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Events causing traffic disruptions in one VSAN are contained within that VSAN and are not
propagated to other VSANs.
The switch icons shown in both Figure 26-1 and Figure 26-2 indicate that these features apply to any
switch in the Cisco MDS 9000 Family.
Figure 26-1 shows a fabric with three switches, one on each floor. The geographic location of the
switches and the attached devices is independent of their segmentation into logical VSANs. No
communication between VSANs is possible. Within each VSAN, all members can talk to one another.
Switch 1
Floor 3
Switch 2
Floor 2
Switch 3
79532
Floor 1
Figure 26-2 shows a physical Fibre Channel switching infrastructure with two defined VSANs: VSAN
2 (dashed) and VSAN 7 (solid). VSAN 2 includes hosts H1 and H2, application servers AS2 and AS3,
and storage arrays SA1 and SA4. VSAN 7 connects H3, AS1, SA2, and SA3.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
H1
FC FC FC FC
Link in VSAN 2
Link in VSAN 7 79533
Trunk link
The four switches in this network are interconnected by trunk links that carry both VSAN 2 and
VSAN 7 traffic. The inter-switch topology of both VSAN 2 and VSAN 7 are identical. This is not a
requirement and a network administrator can enable certain VSANs on certain links to create different
VSAN topologies.
Without VSANs, a network administrator would need separate switches and links for separate SANs. By
enabling VSANs, the same switches and links may be shared by multiple VSANs. VSANs allow SANs
to be built on port granularity instead of switch granularity. Figure 26-2 illustrates that a VSAN is a
group of hosts or storage devices that communicate with each other using a virtual topology defined on
the physical SAN.
The criteria for creating such groups differ based on the VSAN topology:
VSANs can separate traffic based on the following requirements:
Different customers in storage provider data centers
Production or test in an enterprise network
Low and high security requirements
Backup traffic on separate VSANs
Replicating data from user traffic
VSANs can meet the needs of a particular department or application.
VSAN Advantages
VSANs offer the following advantages:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Traffic isolationTraffic is contained within VSAN boundaries and devices reside only in one
VSAN ensuring absolute separation between user groups, if desired.
ScalabilityVSANs are overlaid on top of a single physical fabric. The ability to create several
logical VSAN layers increases the scalability of the SAN.
Per VSAN fabric servicesReplication of fabric services on a per VSAN basis provides increased
scalability and availability.
RedundancySeveral VSANs created on the same physical SAN ensure redundancy. If one VSAN
fails, redundant protection (to another VSAN in the same physical SAN) is configured using a
backup path between the host and the device.
Ease of configurationUsers can be added, moved, or changed between VSANs without changing
the physical structure of a SAN. Moving a device from one VSAN to another only requires
configuration at the port level, not at a physical level.
Up to 1024 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and
another is an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
Figure 26-3 shows the possible relationships between VSANs and zones. In VSAN 2, three zones are
defined: zone A, zone B, and zone C. Zone C overlaps both zone A and zone B as permitted by Fibre
Channel standards. In VSAN 7, two zones are defined: zone A and zone D. No zone crosses the VSAN
boundarythey are completely contained within the VSAN. Zone A defined in VSAN 2 is different and
separate from zone A defined in VSAN 7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Physical Topology
AS2 AS3
Zone A
H2 SA1
VSAN 2
Zone C
H1 SA4
Zone B
H3
Zone D
VSAN 7
Zone A
AS1 SA2 SA3
79534
VSAN Configuration
VSANs have the following attributes:
VSAN IDThe VSAN ID identifies the VSAN as the default VSAN (VSAN 1), user-defined
VSANs (VSAN 2 to 4093), and the isolated VSAN (VSAN 4094).
StateThe administrative state of a VSAN can be configured to an active (default) or suspended
state. Once VSANs are created, they may exist in various conditions or states.
The active state of a VSAN indicates that the VSAN is configured and enabled. By enabling a
VSAN, you activate the services for that VSAN.
The suspended state of a VSAN indicates that the VSAN is configured but not enabled. If a port
is configured in this VSAN, it is disabled. Use this state to deactivate a VSAN without losing
the VSANs configuration. All ports in a suspended VSAN are disabled. By suspending a
VSAN, you can preconfigure all the VSAN parameters for the whole fabric and activate the
VSAN immediately.
VSAN nameThis text string identifies the VSAN for management purposes. The name can be
from 1 to 32 characters long and it must be unique across all VSANs. By default, the VSAN name
is a concatenation of VSAN and a four-digit string representing the VSAN ID. For example, the
default name for VSAN 3 is VSAN0003.
Load balancing attributesThese attributes indicate the use of the source-destination ID (src-dst-id)
or the originator exchange OX ID (src-dst-ox-id, the default) for load balancing path selection.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note OX ID based load balancing of IVR traffic from IVR- enabled switches is not supported on
Generation 1 switching modules. OX ID based load balancing of IVR traffic from a non-IVR
MDS switch should work. Generation 2 switching modules support OX ID based load
balancing of IVR traffic from IVR-enabled switches.
This section describes how to create and configure VSANs and includes the following topics:
About VSAN Creation, page 26-6
Creating VSANs Statically, page 26-6
About Port VSAN Membership, page 26-8
Assigning Static Port VSAN Membership, page 26-8
About the Default VSAN, page 26-8
About the Isolated VSAN, page 26-8
Displaying Isolated VSAN Membership, page 26-9
Operational State of a VSAN, page 26-9
Mapping VSANs to VLANs, page 26-9
About Static VSAN Deletion, page 26-12
Deleting Static VSANs, page 26-13
About Load Balancing, page 26-13
Configuring Load Balancing, page 26-13
About Interop Mode, page 26-14
About FICON VSANs, page 26-14
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note As of Cisco SAN-OS Release 3.1(2) and later, if you check the Static Domain IDs check box,
Fabric Manager creates the VSAN in suspended mode and then automatically activates the
VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Interfaces > FC Physical from the Physical Attributes pane. You see the interface configuration
in the Information pane.
Step 2 Click the General tab.
You see the Fibre Channel general physical information. Double-click and complete the PortVSAN field.
Step 3 Click Apply Changes to save these changes, or click Undo Changes to discard any unsaved changes.
Note Up to 1024 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and
another is an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note When you configure a port in VSAN 4094 or move a port to VSAN 4094, that port is immediately
isolated.
Note Up to 1024 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and
another is an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
Step 1 Expand Fabricxx and then select All VSANs in the Logical Domains pane.
You see the VSAN configuration in the Information pane.
Step 2 Click the Isolated Interfaces tab.
You see the interfaces that are in the isolated VSAN.
Note This section applies to Cisco Nexus 5000 Series switches only.
A VSAN-VLAN mapping indicates the VLAN that is used to transport Fibre Channel traffic for a
specific VSAN. Each virtual Fibre Channel interface is associated with only one VSAN. Any VSAN
with associated virtual Fibre Channel interfaces must be mapped to a dedicated Fibre Channel over
Ethernet (FCoE)-enabled VLAN. FCoE is not supported on private VLANs.
This section provides information about how to configure a virtual Fibre Channel interface and includes
the following topics:
Mapping VSANs to VLANs Using Fabric Manager, page 26-10
Mapping VSANs to VLANs Using Device Manager, page 26-11
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You must have a Cisco Nexus 5000 Series switch in the fabric to map a VSAN to a VLAN using the
VSAN-VLAN Mapping tab in the Information pane.
The table shows the existing VSAN-VLAN mappings and the operational state of each VLAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 From the Switch drop-down list, choose a Cisco Nexus 5000 Series switch.
Step 5 In the VSAN Id and VLAN Id fields, enter the VSAN ID and the VLAN ID that will be mapped together.
Step 6 Click Create to create the mapping.
Step 1 Launch Device Manager from the Cisco Nexus 5000 Series switch, as described in the Launching
Device Manager section on page 6-2.
Step 2 Choose FC > VSANs.
You see the VSAN dialog box. In the dialog box, the Membership tab displays the virtual Fibre Channel
interfaces associated with a VSAN.
Step 3 Click the VSAN-VLAN Mapping tab.
In the VSAN-VLAN Mapping tab, the table lists the existing VSAN-VLAN mappings and the
operational state of each VLAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 In the VSAN Id and VLAN Id fields, enter the VSAN ID and the VLAN ID that will be mapped together.
Step 6 Click Create to create the mapping.
Before After
Default VSAN 7 Default VSAN 7
VSAN VSAN
Switch 1 Switch 1
VSAN-based runtime (name server), zoning, and configuration (static routes) information is
removed when the VSAN is deleted.
Configured VSAN interface information is removed when the VSAN is deleted.
Note The allowed VSAN list is not affected when a VSAN is deleted (see Chapter 24, Configuring
Trunking).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Any commands for a nonconfigured VSAN are rejected. For example, if VSAN 10 is not configured in
the system, then a command request to move a port to VSAN 10 is rejected.
Step 1 Choose Fabricxx > All VSANs from the Logical Domains pane.
You see the VSAN configuration in the Information pane shown in Figure 26-12.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 26-2 lists the default settings for all configured VSANs.
Parameters Default
Default VSAN VSAN 1.
State Active state.
Name Concatenation of VSAN and a four-digit string representing the
VSAN ID. For example, VSAN 3 is VSAN0003.
Load-balancing attribute OX ID (src-dst-ox-id).
CH A P T E R 27
SAN Device Virtualization
This chapter describes how to configure virtual devices to represent physical end devices for switches
running Cisco MDS SAN-OS Release 3.1(2) and later, or NX-OS Release 4.1(1a) and later.
Cisco SAN device virtualization (SDV) is a licensed feature included in the Cisco MDS 9000 Family
Enterprise package (ENTERPRISE_PKG). See Chapter 10, Obtaining and Installing Licenses, for
details about acquiring licenses.
This chapter includes the following sections:
About SDV, page 27-1
Configuring SDV, page 27-4
Default Settings, page 27-10
About SDV
As of Cisco SAN-OS Release 3.1(2) and NX-OS Release 4.1(1a), you can use Cisco SDV to create
virtual devices that represent physical end-devices. Virtualization of SAN devices accelerates swapout
or failover to a replacement disk array, and it also minimizes downtime when replacing host bus adapters
(HBAs) or when re-hosting an application on a different server.
SAN devices that are virtualized can be either initiators or targets. You can virtualize targets to create a
virtual target, and also virtualize initiators to create a virtual initiator. Such configurations do not
distinguish between virtual initiators and virtual targets (see Figure 27-1 and Figure 27-2).
Primary target
Virtual
Server target
Traffic from
server
183017
Secondary target
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Primary
initiator
Virtual
initiator
Traffic from
server
183018
Secondary
initiator
Note While most of the examples in this chapter describe target virtualization, the initiator virtualization
functions similarly.
Typically, todays deployments for handling device failures are designed for high availability (HA), with
redundancy being a key part of this design. Consider the situation where a target is designed to be
redundant. Two arrays are deployeda primary and secondary in this situation. Enterprises often use
some type of consistency technology (such as EMF SRDF) between the primary and secondary arrays
to ensure that the secondary is a mirrored copy of the production LUN. However, if the primary array
fails, it must be replaced by the secondary because all I/O must occur on the secondary array. Problems
can occur because the time required to bring the secondary array up and have it working often takes
longer than most can afford (Figure 27-3 illustrates this dilemma).
Figure 27-3 Typical Deployment for Handling Device Failures Before SDV
Primary
Device
Servers
I/O - Normal
SAN Asychronous
Replication
I/O - After primary
failure
Secondary 182097
Device
If a storage array is replaced without using Cisco SDV, then it may require the following actions:
Taking down a server to modify zoning and account for the new array.
Changing the Cisco NX-OS configuration to accommodate Fibre Channel IDs (FC IDs) and
pWWNs of the new array.
Changing a server configuration to accommodate the new FC IDs and pWWNs.
More specifically, without SDV you might experience the following conditions:
It can take a considerable amount of time to configure a secondary device for a typical production
environment.
In the zoning configuration, all the initiators must be rezoned with the secondary device, and certain
initiators must also be reconfigured. For example, the WWN and FC ID of the secondary device are
different, so driver files must be changed and the server must be rebooted.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Clustering (multiple initiators) compounds the problem, and the failover procedure must be repeated
for each server of the cluster. Think of a server cluster as a set of HBAsany storage array FC ID
changes must be performed for each HBA.
SDV enables you to achieve the following performance targets:
Reduce the amount of time it takes for data migration, and ultimately the overall amount of
downtime.
Easily scale to larger numbers of devices.
Figure 27-4 illustrates the benefits of SDV. In this configuration, disk array Y replaces disk array X.
When disk array X was deployed, the user created virtual devices for all the Fibre Channel interfaces
using SDV. After data replication from disk array X was completed, the user briefly pauses activity on
the application server and relinked disk array Y to the virtual devices used by the server, completing the
swapout of disk array X. No zoning changes or host operating system configuration changes were
required during the time-critical period when the swap was performed; this significantly minimized
application downtime.
Note The array administrator will likely have to perform actions on array Y for it to become a primary device
and accept server logins before linking the virtual device to the array Y pWWN.
Storage Arrays
Server
X Y
Virtual
Device
159897
Key Concepts
The following terms are used throughout this chapter:
Virtual deviceThe virtualized or proxy representation of the real device, which is registered with
the name server and has a pWWN and FC ID. A virtual device exists as long as its real (physical)
counterpart is online. The virtual device pWWN and FC ID must be unique and cannot clash with
any real device pWWNs and FC IDs.
Virtual domainReserved by SDV to assign FC IDs to virtual devices. If the switch that reserved
the domain goes down, another switch takes over its role using the same domain.
Primary deviceThe device that is configured as primary. By default, the primary device becomes
the active device if it is online.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Secondary deviceThe additional device that is configured. By default, the secondary device is
standby.
Active deviceThe device that is currently virtualized is called the active device. By default, the
primary device becomes the active device if it is online. The active device is indicated by a (*)
symbol.
Configuring SDV
SDV is a distributed service and uses Cisco Fabric Services (CFS) distribution to synchronize the
databases. When you configure SDV, it starts a CFS session and locks the fabric. When a fabric is locked,
Cisco NX-OS software does not allow any configuration changes from a switch other than the switch
holding the lockand issues a message to inform users about the locked status. Configuration changes
are held in a pending database for the application. You must perform a commit operation to make the
configuration active and to release the lock for all switches.
See Chapter 13, Using the CFS Infrastructure for more details about CFS,
Note When you enable SDV, CFS distribution is also enabled; CFS distribution cannot be disabled for SDV.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Identifier (OUI). A virtual device appears as a real, physical device. You can enumerate up to 128 devices
for a virtual device. There is a limit of 4095 on the number of virtual devices that you can create in a
single VSAN.
Figure 27-5 shows a configuration that includes a new virtual device, vt1.
SAN Device
Virtualization Virtual
vtpwwn Device
vt1
VT
t1pwwn t2pwwn
t1 t2
159900
Primary Secondary
As of MDS NX-OS Release 4.1(1a), the following conditions must be considered when configuring the
virtual device failover attributes:
The attribute configuration is supported only with MDS NX-OS Release 4.1(1a) and later. In a
mixed mode fabric where earlier releases are combined, the attribute configuration will fail.
When the failover attribute is configured, if the primary device is offline then the secondary device
becomes active.
When the failover attribute is deleted after the primary device failover to the secondary device, then
the primary becomes active if the primary device is online. If the primary device is not online, then
the SDV virtual device is shut down.
Note The SDV attributes configuration is supported in MDS Fabric Manager Release 4.1(2) and later.
To configure a virtual target and commit it to the fabric configuration using Fabric Manager, follow these
steps:
Step 1 Expand SAN in the Logical Domains pane. Then expand the fabric in which your VSAN resides.
Step 2 Expand the VSAN in which you wish to create the virtual target and select SDV. You see the switches
in the VSAN that you selected listed in the Information pane.
Step 3 In the Control tab, select enable from the drop-down menu in the Command column to enable SAN
device virtualization for a particular switch in the VSAN(see Figure 27-6).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Click the Apply Changes icon to commit the configuration change.
Step 5 Click the CFS tab. Confirm that the SAN device virtualization feature is enabled for the switch.
Step 6 Click the Virtual Devices tab and then click the Create Row icon.
You see the Create Virtual Devices dialog box (see Figure 27-7).
Step 7 Select the Virtual Device ID from the drop-down list (ranges from 1 to 4096).
Step 8 Enter a Name for the Virtual Device. Select the Virtual Domain and enter a Virtual FC ID for the virtual
target.
Step 9 Check only the autoFailover check box, or check the autoFailover and primFallback check boxes. For
more information, see the Automatic Failover and Fallback section on page 27-4. You can also change
the option in the Option column of the Virtual Devices tab. (See Figure 27-8).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The pWWN of the virtual target does not appear in the zoning end devices database in Fabric Manager.
If you want to zone the virtual device with a pWWN, you must enter it in the Add Member to Zone dialog
box when creating a zone. However, if the device alias is in enhanced mode, the virtual device names
appear in the device alias database in the Fabric Manager zoning window. In this case, users can choose
to select either the device alias name or enter the pWWN in the Add Member to Zone dialog box.
For more information, see the Adding Zone Members section on page 30-14.
Set the device alias mode to enhanced when using SDV (because the pWWN of a virtual device could
change).
For example, SDV is enabled on a switch and a virtual device is defined. SDV assigns a pWWN for the
virtual device, and it is zoned based on the pWWN in a zone. If you later disable SDV, this configuration
is lost. If you reenable SDV and create the virtual device using the same name, there is no guarantee that
it will get the same pWWN again. You would have to rezone the pWWN-based zone. However, if you
perform zoning based on the device-alias name, there are no configuration changes required if or when
the pWWN changes.
Be sure you understand how device alias modes work before enabling them. Refer to Chapter 31,
Distributing Device Alias Services for details and requirements about device alias modes.
Note When a link operation fails over to the secondary device, the virtual device is taken offline, and then
brought online.
As of MDS NX-OS Release 4.1(1a), the following conditions must be considered before linking a
device:
If you link to the secondary device which is currently active because of failover, the primary tag is
moved to the secondary device and the secondary device becomes the primary device.
When the secondary device is active, if you link to a third device, and if the fallback attribute was
not configured, the third device becomes the primary device but the secondary device continues to
be the active device.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
When the secondary device is active, if you link to a third device, and if the fallback attribute was
configured, then the third device becomes the primary device as well as the active device.
To link a virtual target with a physical target using Fabric Manager, follow these steps:
Step 1 Click the Real Devices tab and then click the Create Row icon.
Step 2 Select the Virtual Device ID from the pull-down list or enter an existing ID for the virtual target that you
are linking with a physical target(see Figure 27-9).
Step 3 Select the Real Device ID of the physical target that you are linking with the virtual target.
Virtual
Device
t1pwwn t2pwwn
t1 t2
159901
Primary Secondary
Step 4 Choose either the pWWN or deviceAlias radio button, and select the appropriate pWWN or device alias
from the pull-down menu. Note that the Name field is automatically populated when you select the
pWWN or device alias.
Step 5 Choose either the primary or secondary radio button for the Map Type.
Step 6 Click the CFS icon to save and distribute these changes, or click Close to discard any unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
A blank commit is a commit operation that does not contain configuration changes, and enforces the SDV
configuration of the committing switch fabric-wide. A blank commit operation resolves merge conflicts
by pushing the configuration from the committing switch throughout the fabric, which reinitializes the
conflicting virtual devices. Exercise caution while performing this operation, as it can easily take some
virtual devices offline.
Merge failures resulting from a pWWN conflict can cause a failure with the device alias as well. A blank
commit operation on a merge-failed VSAN within SDV should resolve the merge failure in the device
alias.
You can avoid merge conflicts due to configuration mismatch by ensuring that:
The pWWN and device alias entries for a virtual device are identical (in terms of primary and
secondary).
There are no virtual device name conflicts across VSANs in fabrics.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution There must be at least one SDV-enabled switch that is not a Cisco MDS 9124 Switch between the server
and the device that are being virtualized. In other words, SDV does not work when initiators and primary
devices are connected to the same Cisco MDS 9124 Switch.
Default Settings
Table 27-1 lists the default settings for SDV parameters.
Parameters Default
enable disabled
CH A P T E R 28
Creating Dynamic VSANs
Port VSAN membership on the switch is assigned on a port-by-port basis. By default each port belongs
to the default VSAN.
You can dynamically assign VSAN membership to ports by assigning VSANs based on the device
WWN. This method is referred to as Dynamic Port VSAN Membership (DPVM). DPVM offers
flexibility and eliminates the need to reconfigure the port VSAN membership to maintain fabric
topology when a host or storage device connection is moved between two Cisco MDS switches or two
ports within a switch. It retains the configured VSAN regardless of where a device is connected or
moved. To assign VSANs statically, see Chapter 26, Configuring and Managing VSANs.
This chapter includes the following sections:
DPVM, page 28-1
DPVM Database Distribution, page 28-10
Database Merge Guidelines, page 28-13
Default Settings, page 28-15
DPVM
DPVM configurations are based on port world wide name (pWWN) and node world wide name (nWWN)
assignments. A DPVM database contains mapping information for each device pWWN/nWWN
assignment and the corresponding VSAN. The Cisco NX-OS software checks the database during a
device FLOGI and obtains the required VSAN details.
The pWWN identifies the host or device and the nWWN identifies a node consisting of multiple devices.
You can assign any one of these identifiers or any combination of these identifiers to configure DPVM
mapping. If you assign a combination, then preference is given to the pWWN.
DPVM uses the Cisco Fabric Services (CFS) infrastructure to allow efficient database management and
distribution. DPVM uses the application driven, coordinated distribution mode and the fabric-wide
distribution scope (see Chapter 13, Using the CFS Infrastructure).
Note DPVM does not cause any changes to device addressing. DPVM only pertains to the VSAN membership
of the device, ensuring that the host gets same VSAN membership on any port on the switch. For
example, if a port on the switch has a hardware failure, you can move the host connection to another port
on the switch and not need to update the VSAN membership manually.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The DPVM feature overrides any existing static port VSAN membership configuration. If the VSAN
corresponding to the dynamic port is deleted or suspended, the port is shut down.
To begin configuring DPVM, you must explicitly enable DPVM on the required switches in the fabric.
By default, this feature is disabled in all switches in the Cisco MDS 9000 Family.
Step 1 Click the DPVM Setup Wizard icon in the Fabric Manager toolbar (See Figure 28-1).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 8 Select the switch you want to be the master switch. This switch controls the distribution of the DPVM
database to other switches in the fabric.
Step 9 Click Next.
You see the AutoLearn Current End Devices page as shown in Figure 28-3.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 10 (Optional) Check the Create Configuration From Currently Logged In End Devices check box if you
want to enable autolearning.
Step 11 Click Next.
You see the Edit and Activate Configuration page as shown in Figure 28-4.
Step 12 Verify the current or autolearned configuration. Optionally, click Insert to add more entries into the
DPVM config database.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 13 Click Finish to update the DPVM config database, distribute the changes using CFS, and activate the
database, or click Cancel to exit the DPVM Setup Wizard without saving changes.
Step 1 Expand Fabricxx> All VSANs and then select DPVM in the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the CFS tab and select a master switch by checking a check box in the Master column.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You must click on the CFS tab inorder to activate the other tabs
Step 3 Click the Config Database tab and then click the Create Row to insert a new entry.
You see the Create Config Database dialog box shown in Figure 28-6.
Step 4 Choose an available WWN and VSAN combination or fill in the pWWN and Login VSAN fields.
Step 5 Click Create to save these changes in the config or pending database or click Close to discard any
unsaved changes.
Step 6 Click the CFS tab and select the Config Action drop-down menu for the master database.
You see the options shown in Figure 28-7.
Step 7 Select commit from the drop-down menu to distribute these changes or abort to discard the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the Action tab and set the Action drop-down menu to activate or forceActivate to activate the
DPVM config database (see Figure 28-8).
Step 3 Click the CFS tab and select the Config Action drop-down menu for the master database.
You see the options shown in Figure 28-9.
Step 4 Select commit from the drop-down menu to distribute these changes or abort to discard the changes.
Note To disable DPVM, you must explicitly deactivate the currently active DPVM database.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the CFS tab and set the Config View drop-down menu to pending (see Figure 28-10).
Note Autolearning is only supported for devices connected to F ports. Devices connected to FL ports are not
entered into the DPVM database because DPVM is not supported on FL ports.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Learning new device logins Occurs as and when new devices log in to the switch.
Enabling Autolearning
To enable autolearning using Fabric Manager, follow these steps:
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the Actions tab and check the Auto Learn Enable check box to enable autolearning (see
Figure 28-11).
Step 3 Click the CFS tab and select commit to distribute these changes or abort to discard the changes.
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the Actions tab and select clearOnWWN from the Auto Learn Clear drop-down men.
Step 3 Check the clear WWN check box next to the WWN of the autolearned entry that you want to clear.
Step 4 Click CFS and select commit to distribute these changes or abort to discard the changes.
To clear all autolearn entries using Fabric Manager, follow these steps:
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the Actions tab.
You see the DPVM Actions menu shown in Figure 28-12.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select clear from the Auto Learn Clear drop-down menu.
Step 4 Click the CFS tab and select commit to distribute these changes or abort to discard the changes.
Note These two procedures do not start a session and can only be issued in the local switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
These changes are distributed to all switches in a fabric when you commit the changes. You can also
discard (abort) the changes at this point.
Tip See the Viewing the Pending Database section on page 28-8 to view the contents of the of the pending
database.
Tip See the Viewing the Pending Database section on page 28-8 to view the contents of the pending
database.
To disable DPVM database distribution to the neighboring switches using Fabric Manager, follow these
steps:
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the CFS tab and select disable from the Admin drop-down menu.
Step 3 Click Apply Changes to save this change or click Undo Changes to discard the change.
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the Config Database tab and Create Row.
You see the Create Config Database dialog box shown in Figure 28-13.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Committing Changes
If you commit the changes made to the configuration, the configuration in the DPVM pending database
are distributed to other switches. On a successful commit, the configuration change is applied throughout
the fabric and the lock is released.
To commit the DPVM pending database using Fabric Manager, follow these steps:
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the CFS tab and select commit from the Config Action drop-down menu.
Step 3 Click Apply Changes to save this change or click Undo Changes to discard the change.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Discarding Changes
If you discard (abort) the changes made to the DPVM pending database, the configurations remain
unaffected and the lock is released.
To discard the DPVM pending database using Fabric Manager, follow these steps:
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the CFS tab and select abort from the Config Action drop-down menu.
Step 3 Click Apply Changes to save this change or click Undo Changes to discard the change.
Tip The DPVM pending database is only available in the volatile directory and is subject to being discarded
if the switch is restarted.
To use administrative privileges and release a locked DPVM session using Fabric Manager, follow these
steps:
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the CFS tab and select clear from the Config Action drop-down menu.
Step 3 Click Apply Changes to save this change or click Undo Changes to discard the change.
Caution If you do not follow these two conditions, the merge will fail. The next distribution will forcefully
synchronize the databases and the activation states in the fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
This section describes how to merge DPVM databases and includes the following topics:
About Copying DPVM Databases, page 28-14
Copying DPVM Databases, page 28-14
Comparing Database Differences, page 28-14
Note If you copy the DPVM database and fabric distribution is enabled, you must commit the changes.
Step 1 Expand Fabricxx> All VSANs and then select DPVM in the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the Actions tab and check the CopyActive to Config check box.
Step 3 Click the CFS tab and select commit from the Config Action drop-down menu.
Step 1 Expand Fabricxx> All VSANs and then select DPVM from the Logical Attributes pane.
You see the DPVM configuration in the Information pane.
Step 2 Click the Active Database tab.
You see the DPVM active database in the Information pane.
Step 3 Select Config from the Compare With drop-down menu.
You see the comparison dialog box.
Step 4 Select Close to close the comparison dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 28-1 lists the default settings for DPVM parameters.
Parameters Default
DPVM Disabled.
DPVM distribution Enabled.
Autolearning Disabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 29
Configuring Inter-VSAN Routing
This chapter explains the Inter-VSAN routing (IVR) feature and provides details on sharing resources
across VSANs using IVR management interfaces provided in the switch.
This chapter includes the following sections:
Inter-VSAN Routing, page 29-1
About the IVR Zone Wizard, page 29-7
Manual IVR Configuration, page 29-9
IVR Zones and IVR Zone Sets, page 29-21
Database Merge Guidelines, page 29-31
Default Settings, page 29-34
Inter-VSAN Routing
Virtual SANs (VSANs) improve storage area network (SAN) scalability, availability, and security by
allowing multiple Fibre Channel SANs to share a common physical infrastructure of switches and ISLs.
These benefits are derived from the separation of Fibre Channel services in each VSAN and isolation of
traffic between VSANs. Data traffic isolation between the VSANs also inherently prevents sharing of
resources attached to a VSAN, such as robotic tape libraries. Using IVR, you can access resources across
VSANs without compromising other VSAN benefits.
This section includes the following topics:
About IVR, page 29-2
IVR Features, page 29-3
IVR Limits Summary, page 29-4
IVR Terminology, page 29-3
Fibre Channel Header Modifications, page 29-4
IVR NAT, page 29-5
IVR VSAN Topology, page 29-6
IVR Interoperability, page 29-7
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
About IVR
Note IVR is not supported on the Cisco MDS 9124 Fabric Switch, the Cisco MDS 9134 Fabric Switch, the
Cisco Fabric Switch for HP c-Class BladeSystem, and the Cisco Fabric Switch for IBM BladeCenter.
Data traffic is transported between specific initiators and targets on different VSANs without merging
VSANs into a single logical fabric. Fibre Channel control traffic does not flow between VSANs, nor can
initiators access any resource across VSANs other than the designated ones. Valuable resources such as
tape libraries are easily shared across VSANs without compromise.
IVR is in compliance with Fibre Channel standards and incorporates third-party switches, however,
IVR-enabled VSANs may have to be configured in one of the interop modes.
IVR is not limited to VSANs present on a common switch. Routes that traverse one or more VSANs
across multiple switches can be established, if necessary, to establish proper interconnections. IVR used
in conjunction with FCIP provides more efficient business continuity or disaster recovery solutions (see
Figure 29-1).
FC FC FC FC FC FC
T S1 S2
105294
VSAN 2 VSAN 3
VSAN 1
Note OX ID based load balancing of IVR traffic from IVR- enabled switches is not supported on Generation
1 switching modules. OX ID based load balancing of IVR traffic from a non-IVR MDS switch should
work. Generation 2 switching modules support OX ID based load balancing of IVR traffic from
IVR-enabled switches.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IVR Features
IVR supports the following features:
Accesses resources across VSANs without compromising other VSAN benefits.
Transports data traffic between specific initiators and targets on different VSANs without merging
VSANs into a single logical fabric.
Shares valuable resources (like tape libraries) across VSANs without compromise.
Provides efficient business continuity or disaster recovery solutions when used in conjunction with
FCIP.
Is in compliance with Fibre Channel standards.
Incorporates third-party switches, however, IVR-enabled VSANs may have to be configured in one
of the interop modes.
IVR Terminology
The following IVR-related terms are used in this chapter:
Native VSANThe VSAN to which an end device logs on is the native VSAN for that end device.
Current VSANThe VSAN currently being configured for IVR.
Inter-VSAN routing zone (IVR zone)A set of end devices that are allowed to communicate across
VSANs within their interconnected SAN fabric. This definition is based on their port world wide
names (pWWNs) and their native VSAN associations. Prior to Cisco SAN-OS Release 3.0(3), you
can configure up to 2000 IVR zones and 10,000 IVR zone members on the switches in the network.
As of Cisco SAN-OS Release 3.0(3), you can configure up to 8000 IVR zones and 20,000 IVR zone
members on the switches in the network.
Inter-VSAN routing zone sets (IVR zone sets)One or more IVR zones make up an IVR zone set.
You can configure up to 32 IVR zone sets on any switch in the Cisco MDS 9000 Family. Only one
IVR zone set can be active at any time.
IVR pathAn IVR path is a set of switches and Inter-Switch Links (ISLs) through which a frame
from an end device in one VSAN can reach another end device in some other VSAN. Multiple paths
can exist between two such end devices.
IVR-enabled switchA switch on which the IVR feature is enabled.
Edge VSANA VSAN that initiates (source edge-VSAN) or terminates (destination edge-VSAN)
an IVR path. Edge VSANs may be adjacent to each other or they may be connected by one or more
transit VSANs. In Figure 29-1, VSANs 1, 2, and 3 are edge VSANs.
Note An edge VSAN for one IVR path can be a transit VSAN for another IVR path.
Transit VSANA VSAN that exists along an IVR path from the source edge VSAN of that path to
the destination edge VSAN of that path. In Figure 29-1, VSAN 4 is a transit VSAN.
Note When the source and destination edge VSANs are adjacent to each other, then a transit
VSAN is not required between them.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Border switchAn IVR-enabled switch that is a member of two or more VSANs. Border switches,
such as the IVR-enabled switch between VSAN 1 and VSAN 4 in Figure 29-1, span two or more
different color-coded VSANs.
Edge switchA switch to which a member of an IVR zone has logged in. Edge switches are
unaware of the IVR configurations in the border switches. Edge switches need not be IVR enabled.
Autonomous fabric identifier (AFID)Allows you to configure more than one VSAN in the
network with the same VSAN ID and avoid downtime when enabling IVR between fabrics that
contain VSANs with the same ID.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IVR NAT
Without Network Address Translation (NAT), IVR requires unique domain IDs for all switches in the
fabric. You can enable IVR NAT to allow non-unique domain IDs. This feature simplifies the deployment
of IVR in an existing fabric where non-unique domain IDs might be present.
To use IVR NAT, it must be enabled in all IVR-enabled switches in the fabric IVR configuration
distribution . By default, IVR NAT and IVR configuration distribution are disabled in all switches in the
Cisco MDS 9000 Family.
Note IVR NAT requires Cisco MDS SAN-OS Release 2.1(1a) or later on all switches in the fabric performing
IVR. If you have isolated switches with an earlier release that are involved in IVR, you must remove any
isolated fabrics from monitoring by Fabric Manager server and then re-open the fabric to use IVR NAT.
See the Selecting a Fabric to Manage Continuously section on page 3-3.
Load balancing of IVR NAT traffic across equal cost paths from an IVR-enabled switch is not
supported. However, load balancing of IVR NAT traffic over PortChannel links is supported. The
load balancing algorithm for IVR NAT traffic over port-channel with Generation 1 linecards is
SRC/DST only. Generation 2 linecards support SRC/DST/OXID based load balancing of IVR NAT
traffic across a port-channel.
You cannot configure IVR NAT and preferred Fibre Channel routes on Generation 1 module
interfaces.
IVR NAT allows you to set up IVR in a fabric without needing unique domain IDs on every switch in
the IVR path. IVR NAT virtualizes the switches in other VSANs by using local VSAN for the destination
IDs in the Fibre Channel headers. In some Extended Link Service message types, the destinations IDs
are part of the payload. In these cases, IVR NAT replaces the actual destination ID with the virtualized
destination ID. IVR NAT supports destination ID replacement in the Extended Link Service messages
described in Table 29-2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 29-2 Extended Link Service Messages Supported by IVR NAT (continued)
If you have a message that is not recognized by IVR NAT and contains the destination ID in the payload,
you cannot use IVR with NAT in your topology. You can still use IVR with unique domain IDs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note IVR topology in auto mode requires Cisco MDS SAN-OS Release 2.1(1a) or later and enabling CFS for
IVR on all switches in the fabric.
Autonomous Fabric ID
The autonomous fabric ID (AFID) distinguishes segmented VSANS (that is, two VSANs that are
logically and physically separate but have the same VSAN number). Cisco MDS NX-OS supports AFIDs
from 1 through 64. AFIDs are used in conjunction with auto mode to allow segmented VSANS in the
IVR VSAN topology database. You can configure up to 64 AFIDs.
The AFID can be configured individually for each switch and list of VSANs, or the default AFID can be
configured for each switch.
Note Two VSANs with the same VSAN number but different AFIDs are counted as two VSANs out of the
total 128 VSANs allowed in the fabric.
IVR Interoperability
When using the IVR feature, all border switches in a given fabric must be Cisco MDS switches.
However, other switches in the fabric may be non-MDS switches. For example, end devices that are
members of the active IVR zone set may be connected to non-MDS switches. Non-MDS switches may
also be present in the transit VSAN(s) or in the edge VSANs if one of the interop modes is enabled.
See the Switch Interoperability section on page 37-8.
Step 1 Click the IVR Zone Wizard icon in the Zone toolbar (see Figure 29-2).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To migrate to IVR NAT mode click Yes, otherwise click No. You see the IVR Zone Wizard dialog box.
Step 2 Select the VSANs that will participate in IVR in the fabric. Click Next.
You see the Select End Devices dialog box shown in Figure 29-3.
Step 3 Select the end devices that you want to communicate over IVR.
Note If you are not using IVR NAT, Fabric Manager may display an error message if all the switches
participating in IVR do not have unique domain IDs. You must reconfigure those switches before
configuring IVR. Go to Step 5.
Step 4 If you enable IVR NAT, verify switches that Fabric Manager will enable with IVR NAT, CFS for IVR,
and IVR topology in auto mode.
Step 5 Enter the VSAN ID of the VSAN you want to use as the transit VSAN between the VSANs selected for
the IVR zone. Click Next.
Step 6 Optionally, configure a unique AFID for switches in the fabric that have non-unique VSAN IDs in the
Select AFID dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 If you did not enable IVR NAT, verify the transit VSAN or configure the transit VSAN if Fabric Manager
cannot find an appropriate transit VSAN.
Step 8 Set the IVR zone and IVR zone set.
Step 9 Verify all steps that Fabric Manager will take to configure IVR in the fabric.
Step 10 Click Finish if you want to enable IVR NAT and IVR topology and to create the associated IVR zones
and IVR zone set.
You see the Save Configuration dialog box. You can save the configuration of the master switch to be
copied to other IVR-enabled switches.
Step 11 Click Continue Activation, or you may click Cancel.
Step 12 Click Finish.
Note IVR NAT and auto-topology can be configured independently if you configure these features outside the
IVR Zone Wizard. See the Manual IVR Configuration section on page 29-9.
Note Most tabs in the Information pane for features using CFS are dimmed until you click the CFS tab. The
CFS tab shows which switches have CFS enabled and shows the master switch for this feature. Once the
CFS tab is clicked, the other tabs in the Information pane are activated.
This section describes manually configuring IVR and includes the following topics:
About IVR NAT and Auto Topology, page 29-10
Configuring IVR NAT and IVR Auto Topology, page 29-11
About AFIDs, page 29-11
Configuring Default AFIDs, page 29-12
Configuring Individual AFIDs, page 29-12
About IVR Without IVR NAT or Auto Topology, page 23-23
Configuring IVR Without NAT, page 29-14
Manually Creating the IVR Topology, page 29-15
Activating a Manually Configured IVR Topology, page 29-16
Clearing the Configured IVR Topology, page 29-17
Migrating from IVR Auto Topology Mode to Manual Mode, page 29-17
About IVR Virtual Domains, page 29-18
Configuring IVR Virtual Domains, page 29-18
About Persistent FC IDs for IVR, page 29-19
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The IVR over FCIP feature is bundled with the Cisco MDS 9216i Switch and does not require the SAN
extension over IP package for the fixed IP ports on the supervisor module.
Tip If you change any FSPF link cost, ensure that the FSPF path distance (that is, the sum of the link costs
on the path) of any IVR path is less than 30,000.
Note IVR-enabled VSANs can be configured when the interop mode is enabled (any interop mode) or disabled
(no interop mode).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
You see the inter-VSAN routing configuration in the Information pane shown in Figure 29-4.
Step 2 Select enable from the Admin column drop-down menu for the primary switch.
Step 3 Click the Apply Changes icon to distribute this change to all switches in the fabric.
Step 4 Click the Action tab.
Step 5 Check the Enable IVR NAT check box to enable IVR in NAT mode.
Step 6 Check the Auto Discover Topology check box to enable IVR topology in auto mode.
Step 7 Click the Apply Changes icon to enable IVR on the switches.
About AFIDs
You can configure AFIDs individually for VSANs, or you can set the default AFIDs for all VSANs on
a switch. If you configure an individual AFID for a subset of the VSANs on a switch that has a default
AFID, that subset uses the configured AFID while all other VSANs on that switch use the default AFID.
IVR supports a maximum of 64 AFIDs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You can only use AFID configuration when the VSAN topology mode is automatic. In user-configured
VSAN topology mode, the AFIDs are specified in the VSAN topology configuration itself and a separate
AFID configuration is not needed.
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
You see the IVR configuration in the Information pane.
Step 2 Click the Default Fabric ID tab to display the existing default AFIDs.
Step 3 Click the Create Row icon to create a default AFID.
Step 4 Check the check boxes next to each switch involved in IVR that you want to use this default AFID.
Step 5 Provide a name for each SwitchWWN and set the default Fabric ID.
Step 6 Click Create to create this entry.
Step 7 Repeat Step 1 through Step 6 for all default AFIDs that you want to configure in your IVR topology.
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
You see the IVR configuration in the Information pane.
Step 2 Click the Fabric ID tab to display the existing AFIDs (see Figure 29-5).
Step 3 Click the Create Row icon to create an AFID.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Check the check box next to each switch involved in IVR that you want to use this default AFID.
Step 5 Provide a name for each SwitchWWN and set the Fabric ID.
Step 6 Enter a comma-separated list of VSAN IDs in the VSAN List text box.
Step 7 Click Create to create this entry.
Step 8 Repeat Step 1 through Step 6 for all switches and AFIDs you want to configure in your IVR topology.
Tip If you change any FSPF link cost, ensure that the FSPF path distance (that is, the sum of the link costs
on the path) of any IVR path is less than 30,000.
Note IVR-enabled VSANs can be configured when the interop mode is enabled (any interop mode) or disabled
(no interop mode).
Domain ID Guidelines
Domain IDs must be unique across inter-connected VSANs when not using IVR NAT. To ensure unique
domain IDs across inter-connected VSANs, consider these guidelines:
Minimize the number of switches that require a domain ID assignment. This ensures minimum
traffic disruption.
Minimize the coordination between interconnected VSANs when configuring the SAN for the first
time as well as when you add each new switch.
You can configure domain IDs using one of two options:
Configure the allowed-domains list so that the domains in different VSANs are non-overlapping on
all participating switches and VSANs.
Configure static, non-overlapping domains for each participating switch and VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note In a configuration involving IVR without NAT, if one VSAN in the IVR topology is configured with
static domain IDs, then the other VSANs (edge or transit) in the topology should be configured with
static domain IDs.
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
You see the IVR configuration in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 29-7 Example IVR Topology with Non-Unique VSAN IDs Using AFIDs
VSAN 10 VSAN 10
AF ID 2 AF ID 5
VSAN 5
IVR-Enabled IVR-Enabled
MDS switch MDS switch
Transit VSAN
130184
Note If two VSANs in an IVR topology have the same VSAN ID and different AFIDs, they count as two
VSANs for the 128-VSAN limit for IVR.
Note The use of a single AFID does not allow for segmented VSANs in an inter-VSAN routing topology.
Caution You can only configure a maximum of 128 IVR-enabled switches and 128 distinct VSANs in an IVR
topology (see the Database Merge Guidelines section on page 29-31).
To create the IVR topology using Fabric Manager, follow these steps:
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
You see the IVR configuration in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the Local Topology tab to display the existing IVR topology.
Step 3 Click the Create Row icon to create rows in the IVR topology (see Figure 29-8).
Step 4 Select the switch, switch WWN, and a comma-separated list of VSAN IDs for this topology.
Step 5 Click Create to create this new row.
Step 6 Click the Apply Changes icon to create the IVR topology.
Note Repeat this configuration in all IVR-enabled switches or distribute using CFS.
Tip Transit VSANs are deduced based on your configuration. The IVR feature does not have an explicit
transit-VSAN configuration.
Caution Active IVR topologies cannot be deactivated. You can only switch to IVR topology automatic mode.
To activate the manually configured IVR topology using Fabric Manager, follow these steps:
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
You see the IVR configuration in the Information pane.
Step 2 Click the Action tab to display the existing IVR topology.
Step 3 Check the Activate Local Topology check box (see Figure 29-9).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Click the Apply Changes icon to activate the IVR topology.
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
Step 2 Click the Control tab if it is not already displayed.
Step 3 Highlight the rows you want to delete from the IVR topology.
Step 4 Click the Delete Row icon to delete these rows from the IVR topology.
Step 5 Click the Apply Changes icon to delete the IVR topology.
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
You see the IVR configuration in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip Be sure to add IVR virtual domains if Cisco SN5428 or MDS 9020 switches exist in the VSAN.
When you enable the IVR virtual domains, links may fail to come up due to overlapping virtual domain
identifiers. If so, temporarily withdraw the overlapping virtual domain from that VSAN.
Note Withdrawing an overlapping virtual domain from an IVR VSAN disrupts IVR traffic to and from that
domain.
Tip Only add IVR domains in the edge VSANs and not in transit VSANs.
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
You see the IVR configuration in the Information pane.
Step 2 Click the Domains tab to display the existing IVR topology.
Step 3 Click the Create Row icon to create rows in the IVR topology (see Figure 29-11).
Step 4 Enter the Current Fabric, Current VSAN, Native Fabric, Native VSAN and Domain ID in the dialog box.
These are the VSANs that will add the IVR virtual domains to the assigned domains list.
Step 5 Click Create to create this new row.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you use persistent FC IDs for IVR, we recommend that you use them for all the devices in the IVR
zoneset. We do not recommend using persistent FC IDs for some of the IVR devices while using
automatic allocation for others.
Note In an IVR NAT configuration, if one VSAN in the IVR topology is configured with static domain IDs,
then the IVR domains that can be exported to that VSAN must also be assigned static domains.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand All VSANs and then select IVR in the Logical Domains pane.
You see the IVR configuration in the Information pane.
Step 1 Expand Switches > Events and then select Syslog from the Physical Attributes pane.
Step 2 Click the Severity Levels tab.
Step 3 Click the Facility column header to sort the table by facility name.
Step 4 Select the severity level at which the IVR logs system messages from the Severity drop-down menu (see
Figure 29-13).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip Setting the severity to warning means that all IVR messages at the warning level or above will
be logged to Fabric Manager.
Step 5 Click the Apply Changes icon to save these changes locally.
Note The same IVR zone set must be activated on all of the IVR-enabled switches.
Caution Prior to Cisco SAN-OS Release 3.0(3) you can only configure a total of 10,000 zone members on all
switches in a network. As of Cisco SAN-OS Release 3.0(3) you can only configure a total of 20,000 zone
members on all switches in a network. A zone member is counted twice if it exists in two zones. See the
Database Merge Guidelines section on page 29-31.
This section describes configuring IVR zones and IVR zone sets and includes the following topics:
About IVR Zones, page 29-22
Configuring IVR Zones and IVR Zone Sets, page 29-23
About Activating Zone Sets and Using the force Option, page 29-26
Recovering an IVR Full Zone Database, page 29-28
Recovering an IVR Full Topology, page 29-29
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
pwwn1
pwwn2
pwwn3
pwwn4
105255
Active zone in VSAN 3:
The zones are created automatically by the IVR process when an IVR zone set is activated. They are not
stored in a full zone set database and are lost when the switch reboots or when a new zone set is activated.
The IVR feature monitors these events and adds the zones corresponding to the active IVR zone set
configuration when a new zone set is activated. Like zone sets, IVR zone sets are also activated
nondisruptively.
Note If pwwn1 and pwwn2 are in an IVR zone in the current as well as the new IVR zone set, then activation
of the new IVR zone set does not cause any traffic disruption between them.
IVR zone and IVR zone set names are restricted to 64 alphanumeric characters.
Caution Prior to Cisco SAN-OS Release 3.0(3) you can only configure a total of 2000 IVR zones and 32 IVR
zone sets on the switches in the network. As of Cisco SAN-OS Release 3.0(3) you can only configure a
total of 8000 IVR zones and 32 IVR zone sets on the switches in the network. See the Database Merge
Guidelines section on page 29-31.
Step 1 Choose Zone > IVR > Edit Local Full Zone Database.
You see the Edit IVR Local Full Zone Database dialog box for the selected VSAN (see Figure 29-15).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 29-15 Edit IVR Local Full Zone Database Dialog Box
If you want to view zone membership information, right-click in the Members column, and then click
Show Details for the current row or all rows from the pop-up menu.
Step 2 Click Zones in the left pane and click the Insert icon to create a zone.
You see the Create IVR Zone dialog box shown in Figure 29-16.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 29-17 Edit IVR Local Full Zone Database Dialog Box
Step 7 Alternatively, click the zone where you want to add members and click the Insert icon.
You see the Add Member to Zone dialog box shown in Figure 29-18.
Step 8 If you added a zone set, select the new zone set and then click Activate.
You see the Save Configuration dialog box shown in Figure 29-19.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 9 Check the Save Running to Startup Configuration check box to save all changes to the startup
configuration.
Step 10 Click Continue Activation to activate the zone set.
Note Sometimes zone names beginning with prefix IVRZ and a zone set with name nozoneset appear
in a logical view. The zones with prefix IVRZ are IVR zones that get appended to regular active
zones. The prefix IVRZ is appended to active IVR zones by the system. Similarly the zone set
with name nozoneset is an IVR active zone set created by the system if no active zone set is
available for that VSAN and if the ivrZonesetActivateForce flag is enabled on the switch.
In the server.properties file, you can set the property zone.ignoreIVRZones to true or false to
either hide or view IVR zones as part of regular active zones. See the Fabric Manager Server
Properties File section on page 3-4 for more information on the server.properties file.
Note Do not create a zone with prefix the IVRZ or a zone set with name no zoneset. These names are
used by the system for identifying IVR zones.
Step 11 Select the new zone or zone set from the list in the Information pane and then click Distribute.
Caution If you deactivate the regular active zone set in a VSAN, the IVR zone set is also deactivated. This occurs
because the IVR zone in the regular active zone set, and all IVR traffic to and from the switch, is stopped.
To reactivate the IVR zone set, you must reactivate the regular zone set.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If IVR and iSLB are enabled in the same fabric, at least one switch in the fabric must have both features
enabled. Any zoning related configuration or activation operation (for normal zones, IVR zones, or iSLB
zones) must be performed on this switch. Otherwise, traffic might be disrupted in the fabric.
You can also use the force activate option to activate IVR zone sets. Table 29-4 lists the various
scenarios with and without the force activate option.
Table 29-4 IVR Scenarios with and without the Force Activate Option
Force
Default Activate IVR Zone Set Active IVR Possible
Zone Active Zone Set before IVR Option Activation Zone Traffic
Case Policy Zone Activation Used? Status Created? Disruption
1 Deny No active zone set No Failure No No
2 Yes Success Yes No
1
3 Deny Active zone set present No/Yes Success Yes No
4 Permit No active zone set No Failure No No
5 or Yes Success Yes Yes
Active zone set present
1. We recommend that you use the Case 3 scenario.
Caution Using the force activate option of IVR zone set activation may cause traffic disruption, even for devices
that are not involved in IVR. For example, if your configuration does not have any active zone sets and
the default zone policy is permit, then an IVR zone set activation will fail. However, IVR zone set
activation will go through if the force activateoption is used. Because zones are created in the edge
VSANs corresponding to each IVR zone, traffic may be disrupted in edge VSANs where the default zone
policy is permit.
To activate or deactivate an existing IVR zone set using Fabric Manager, follow these steps:
Step 1 Click Zone and then select Edit Local Full Zone Database as shown in Figure 29-20.
You see the Edit Local Full Zone Database dialog box in Figure 29-21.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select a Zoneset folder and then click Activate to activate the zone set (shown in Figure 29-21) or click
Deactivate to deactivate an activated zone set.
You see the Save Configuration dialog box shown in Figure 29-22.
Step 3 (Optional) Check one of the Save Running to Configuration check boxes to save these changes to the
startup configuration (see Figure 29-22).
Step 4 Click Continue Activation to activate the zone set (see Figure 29-22) or Yes if you are deactivating the
zone set.
Note The active zone set in Edit Zone is shown in bold if any change has been made to the full zone
set resulting in a difference between the active zone set and full zone set. Activating the zone set
unbolds it.
Step 1 Choose Zone > IVR > Edit Local Full Zone Database.
You see the Edit IVR Local Full Zone Database dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Choose either Active or Full, depending on which type of IVR database you want to copy.
Step 4 Select the source switch from which to copy the information from the drop-down list.
Step 5 Select the destination switch from the drop-down list.
Step 6 Click Copy to copy the database.
Step 1 Choose Zone > IVR > Edit Local Full Zone Database.
You see the Edit IVR Local Full Zone Database dialog box.
Step 2 Choose Edit > Copy Full Topology.
You see the Copy Full Topology dialog box shown in Figure 29-24.
Step 3 Choose either Active or Full, depending on which type of IVR database you want to copy from.
Step 4 Select the source switch from which to copy the information from the drop-down list.
Step 5 Select the destination switch from the drop-down list.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If other QoS attributes are configured, the highest setting takes priority.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Fabric X Fabric XY
Cisco MDS switch Cisco MDS switch Cisco MDS switch Cisco MDS switch
witch
ISL
120541
wwn4 wwn4
You can configure different IVR configurations in different Cisco MDS switches.
Be aware that the merge follows more liberal approach in order to avoid traffic disruption. After the
merge, the configuration will be a union of the configurations that were present on the two switches
involved in the merge.
The configurations are merged even if both fabrics have different configurations.
A union of zones and zone sets are used to get the merged zones and zone sets. If a dissimilar
zone exists in two fabrics, the dissimilar zones are cloned into the zone set with appropriate
names so both zones are present.
The merged topology contains a union of the topology entries for both fabrics.
The merge will fail if the merged database contains more topology entries than the allowed
maximum.
The total number of VSANs across the two fabrics cannot exceed 128.
Note VSANs with the same VSAN ID but different AFIDs are counted as two separate VSANs.
The total number of IVR-enabled switches across the two fabrics cannot exceed 128.
The total number of zone members across the two fabrics cannot exceed 10,000. As of Cisco
SAN-OS Release 3.0(3), the total number of zone members across the two fabrics cannot exceed
20,000. A zone member is counted twice if it exists in two zones.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If only some of the switches in the fabrics are running Cisco SAN-OS Release 3.0(3) or later, and the
number of zone members exceeds 10,000, you must either reduce the number of zone members in the
fabric or upgrade all switches in both fabrics to Cisco SAN-OS Release 3.0(3) or later.
The total number of zones across the two fabrics cannot exceed 2000. As of Cisco SAN-OS
Release 3.0(3), the total number of zones across the two fabrics cannot exceed 8000.
Note If only some of the switches in the fabrics are running Cisco SAN-OS Release 3.0(3) or later, and if the
number of zones exceeds 2000, you must either reduce the number of zones in the fabric or upgrade all
switches in both fabrics to Cisco SAN-OS Release 3.0(3) or later.
The total number or zone sets across the two fabrics cannot exceed 32.
Table 29-5 describes the results of a CFS merge of two IVR-enabled fabrics under different conditions.
Caution If you do not follow these conditions, the merge will fail. The next distribution will forcefully
synchronize the databases and the activation states in the fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If the failure is due to exceeding the maximum configuration limits in a fabric where the switches
are running more than one Cisco SAN-OS release, then either upgrade the switches running the
earlier release or reduce the number of IVR zones and IIVR zone members on the switches running
the more recent release to the earlier release limit (see theIVR Limits Summary section on
page 29-4).
If the failure is due to exceeding maximum limits in a fabric where all switches are running the same
Cisco SAN-OS release, identify the switch that has the correct configuration and perform a CFS
commit to distribute the IVR configuration (see the Configuring Default AFIDs section on
page 29-12 and theIVR Limits Summary section on page 29-4).
For other failures, resolve the error causing the merge failure on the switch that has the correct
configuration and perform a CFS commit to distribute the IVR configuration (see the Configuring
Individual AFIDs section on page 29-12).
After a successful CFS commit, the merge will be successful.
Default Settings
Table 29-6 lists the default settings for IVR parameters.
Parameters Default
IVR feature Disabled.
IVR VSANs Not added to virtual domains.
IVR NAT Disabled.
QoS for IVR zones Low.
Configuration distribution Disabled.
CH A P T E R 30
Configuring and Managing Zones
Zoning enables you to set up access control between storage devices or user groups. If you have
administrator privileges in your fabric, you can create zones to increase network security and to prevent
data loss or corruption. Zoning is enforced by examining the source-destination ID field.
Advanced zoning capabilities specified in the FC-GS-4 and FC-SW-3 standards are provided. You can
use either the existing basic zoning capabilities or the advanced, standards-compliant zoning
capabilities.
This chapter includes the following sections:
About Zoning, page 30-1
Using the Quick Config Wizard, page 30-7
Zone Configuration, page 30-10
Zone Sets, page 30-15
Zone Set Distribution, page 30-26
Zone Set Duplication, page 30-29
Advanced Zone Attributes, page 30-36
Displaying Zone Information, page 30-42
Enhanced Zoning, page 30-43
Compacting the Zone Database for Downgrading, page 30-47
Default Settings, page 30-48
Note Table 26-1 on page 26-4 lists the differences between zones and VSANs.
About Zoning
Zoning has the following features:
A zone consists of multiple zone members.
Members in a zone can access each other; members in different zones cannot access each other.
If zoning is not activated, all devices are members of the default zone.
If zoning is activated, any device that is not in an active zone (a zone that is part of an active
zone set) is a member of the default zone.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Zoning Example
Figure 30-1 illustrates a zone set with two zones, zone 1 and zone 2, in a fabric. Zone 1 provides access
from all three hosts (H1, H2, H3) to the data residing on storage systems S1 and S2. Zone 2 restricts the
data on S3 to access only by H3. Note that H3 resides in both zones.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Zone 1
H1 S1
Fabric
H2 S2
Zone 2
79535
H3 S3
Of course, there are other ways to partition this fabric into zones. Figure 30-2 illustrates another
possibility. Assume that there is a need to isolate storage system S2 for the purpose of testing new
software. To achieve this, zone 3 is configured, which contains only host H2 and storage S2. You can
restrict access to just H2 and S2 in zone 3, and to H1 and S1 in zone 1.
Zone 1
H1 S1
Fabric
H2 Zone 3 S2
79536
H3 Zone 2 S3
Zone Implementation
All switches in the Cisco MDS 9000 Family automatically support the following basic zone features (no
additional configuration is required):
Zones are contained in a VSAN.
Hard zoning cannot be disabled.
Name server queries are soft-zoned.
Only active zone sets are distributed.
Unzoned devices cannot access each other.
A zone or zone set with the same name can exist in each VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Hard and soft zoning are implemented using the active zone set. Modifications take effect during
zone set activation.
An FC ID or Nx port that is not part of the active zone set belongs to the default zone and the default
zone information is not distributed to other switches.
Note If one zone set is active and you activate another zone set, the currently active zone set is automatically
deactivated. You do not need to explicitly deactivate the currently active zone set before activating a new
zone set.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Active
Zone set Z1
zone set
Zone A
Zone B
Zone C
Active
Zone set Z1
zone set
Zone A
Zone B
Zone C
Active
Zone set Z1
zone set
Zone A
Zone B
Zone C
Zone D
79948
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
As of Cisco SAN-OS Release 3.1(1) and NX-OS Release 4.1(2), you can use the Quick Config Wizard
on the Cisco MDS 9124 Switch to add or remove zone members per VSAN. You can use the Quick
Config Wizard to perform interface-based zoning and to assign zone members for multiple VSANs using
Device Manager.
Note The Quick Config Wizard is supported on the Cisco MDS 9124 Fabric Switch, the Cisco MDS 9134
Fabric Switch, the Cisco Fabric Switch for HP c-Class BladeSystem, and the Cisco Fabric Switch for
IBM BladeCenter.
Caution The Quick Config Wizard can only be used on stand-alone switches that do not have any existing zoning
defined on the switch.
To add or remove ports from a zone and to zone only the devices within a specific VSAN using Device
Manager on the Cisco MDS 9124 Switch, follow these steps:
Step 1 Choose FC > Quick Config or click the Zone icon in the toolbar.
You see the Quick Config Wizard (see Figure 30-5) with all controls disabled and the Discrepancies
dialog box (see Figure 30-4), which shows all unsupported configurations.
Note You will see the Discrepancies dialog box only if there are any discrepancies.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution If there are discrepancies and you click OK, the affected VSANs in the zone databases are
cleared. This may become disruptive if the switch is in use.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Check the check box in the Ports Zoned To column for the port you want to add or remove from a zone.
The check box for the matching port is similarly set. The selected port pair is added or removed from
the zone, creating a two-device zone.
The VSAN drop-down menu provides a filter that enables you to zone only those devices within a
selected VSAN.
Step 4 Right-click any of the column names to show or hide a column.
Step 5 Click Next to verify the changes.
You see the Confirm Changes dialog box shown in Figure 30-6.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 If you want to see the CLI commands, right-click in the dialog box and click CLI Commands from the
pop-up menu.
Step 7 Click Finish to save the configuration changes.
Zone Configuration
This section describes how to configure zones and includes the following topics:
About the Edit Local Full Zone Database Tool, page 30-11
Configuring a Zone Using the Zone Configuration Tool, page 30-12
Adding Zone Members, page 30-14
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
1 You can display information by VSAN by 3 You can add zoning characteristics based on
using the drop-down menu without closing alias in different folders.
the dialog box, selecting a VSAN, and
re-entering.
2 You can use the Add to zone button to move 4 You can triple-click to rename zone sets,
devices up or down by alias or by zone. zones, or aliases in the tree.
Note The Device Alias radio button is visible only if device alias is in enhanced mode. For more information,
see Creating a Device Alias section on page 31-6.
Tip Expand Switches from the Physical Attributes pane to retrieve the sWWN. If you do not provide a
sWWN, the software automatically uses the local sWWN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Interface-based zoning only works with Cisco MDS 9000 Family switches. Interface-based zoning does
not work if interop mode is configured in that VSAN.
Step 1 Click the Zone icon in the toolbar (See Figure 30-8).
If you want to view zone membership information, right-click in the All Zone Membership(s) column,
and then click Show Details for the current row or all rows from the pop-up menu.
Step 3 Click Zones in the left pane and click the Insert icon to create a zone.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see the Create Zone dialog box shown in Figure 30-10.
Note One of these symbols ($, -, ^, _) or all alphanumeric characters are supported. In interop mode
2 and 3, this symbol (_) or all alphanumeric characters are supported.
Step 9 Select the zone set where you want to add a zone and click the Insert icon or you can drag and drop
Zone3 over Zoneset1.
You see the Select Zone dialog box shown in Figure 30-12.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select the members you want to add from the Fabric pane (see Figure 30-13) and click Add to Zone or
click the zone where you want to add members and click the Insert icon.
You see the Add Member to Zone dialog box shown in Figure 30-14.
Note The Device Alias radio button is visible only if device alias is in enhanced mode. For more
information, see Creating a Device Alias section on page 31-6.
Step 4 Click the browse button and select a port name or check the LUN check box and click the browse button
to configure LUNs.
Step 5 Click Add to add the member to the zone.
Note When configuring a zone member, you can specify that a single LUN has multiple IDs depending
on the operating system. You can select from six different operating systems.
Zone Sets
This section describes zone sets and includes the following topics:
About Zone Set Creation, page 30-16
Activating a Zone Set, page 30-17
Displaying Zone Membership Information, page 30-20
About the Default Zone, page 30-20
Configuring the Default Zone, page 30-21
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
H1 H2 H3 S1 S2
Zones provide a mechanism for specifying access control, while zone sets are a grouping of zones to
enforce access control in the fabric. Either zone set A or zone set B can be activated (but not together).
Tip Zone sets are configured with the names of the member zones and the VSAN (if the zone set is in a
configured VSAN).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Check the Save Running to Startup Configuration check box to save all changes to the startup
configuration.
Step 7 Click Continue Activation to activate the zone set, or click Cancel to close the dialog box and discard
any unsaved changes.
You see the Zone Log dialog box, which shows if the zone set activation was successful (see
Figure 30-19).
Deactivating a Zoneset
To deactivate an existing zone set, follow these steps:
Step 1 Right-click the zone set you want to deactivate and then click Deactivate from the pop-up menu.
You see the Deactivate Zoneset dialog box as shown in Figure 30-20.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Enter deactivate in the text box and then click OK.
You see the Input dialog box as shown in Figure 30-21.
Step 3 Enter deactivate in the text box and then click OK to deactivate the zone set.
Note To enable this option, you need to modify the server.properties file. See Fabric Manager Server
Properties File, page 3-4 to know more about modifying server.properties file.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The default zone members are explicitly listed only when the default zone policy is configured
as permit. When the default zone policy is configured as deny, the members of this zone are not
shown. See the Displaying Zone Information section on page 30-42.
Note Unlike configured zones, default zone information is not distributed to the other switches in the fabric.
Traffic can either be permitted or denied among members of the default zone. This information is not
distributed to all switches; it must be configured in each switch.
Note When the switch is initialized for the first time, no zones are configured and all members are considered
to be part of the default zone. Members are not permitted to talk to each other.
Configure the default zone policy on each switch in the fabric. If you change the default zone policy on
one switch in a fabric, be sure to change it on all the other switches in the fabric.
Note The default settings for default zone configurations can be changed.
The default zone members are explicitly listed when the default policy is configured as permit or when
a zone set is active. When the default policy is configured as deny, the members of this zone are not
explicitly enumerated when you view the active zone set.
You can change the default zone policy for any VSAN by choosing VSANxx > Default Zone from the
Fabric Manager menu tree and clicking the Policies tab. It is recommended that you establish
connectivity among devices by assigning them to a non-default zone.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand a VSAN and then select Default Zone in the Fabric Manager Logical Domains pane.
Step 2 Click the Policies tab in the Information pane.
You see the zone policies information in the Information pane (see Figure 30-22).
The active zone set is shown in italic type. After you make changes to the active zone set and before you
activate the changes, the zone set is shown in boldface italic type.
Step 3 In the Default Zone Behaviour field, choose either permit or deny from the drop-down menu.
Tip The Cisco NX-OS software supports a maximum of 2048 aliases per VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Creating FC Aliases
To create an FC alias using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select the member(s) you want to add from the Fabric pane (see Figure 30-25) and click Add to Alias
or click the alias where you want to add members and click the Insert icon.
You see the Add Member to Alias dialog box shown in Figure 30-26.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The Device Alias radio button is visible only if device alias is in enhanced mode. For more
information, see Creating a Device Alias section on page 31-6.
Step 4 Click the browse button and select a port name or check the LUN check box and click the browse button
to configure LUNs.
Step 5 Click Add to add the member to the alias.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Click Yes in the confirmation dialog box to convert that member to pWWN-based membership.
Note If one zone set is active and you activate another zone set, the currently active zone set is
automatically deactivated.
Tip You do not have to copy the running configuration to the startup configuration to store the active zone
set. However, you need to copy the running configuration to the startup configuration to explicitly store
full zone sets. It is not available across switch resets.
Caution If you deactivate the active zone set in a VSAN that is also configured for IVR, the active IVR zone set
(IVZS) is also deactivated and all IVR traffic to and from the switch is stopped. This deactivation can
disrupt traffic in more than one VSAN. Before deactivating the active zone set, check the active zone
analysis for the VSAN . To reactivate the IVZS, you must reactivate the regular zone set (see the
Configuring IVR Zones and IVR Zone Sets section on page 29-23).
Caution If the currently active zone set contains IVR zones, activating the zone set from a switch where IVR is
not enabled disrupts IVR traffic to and from that VSAN. We strongly recommend that you always
activate the zone set from an IVR-enabled switch to avoid disrupting IVR traffic.
Note The pWWN of the virtual target does not appear in the zoning end devices database in Fabric Manager.
If you want to zone the virtual device with a pWWN, you must enter it in the Add Member to Zone dialog
box when creating a zone. However, if the device alias is in enhanced mode, the virtual device names
appear in the device alias database in the Fabric Manager zoning window. In this case, users can choose
to select either the device alias name or enter the pWWN in the Add Member to Zone dialog box.
For more information, see the Adding Zone Members section on page 30-14.
Note Set the device alias mode to enhanced when using SDV (because the pWWN of a virtual device could
change).
For example, SDV is enabled on a switch and a virtual device is defined. SDV assigns a pWWN for the
virtual device, and it is zoned based on the pWWN in a zone. If you later disable SDV, this configuration
is lost. If you reenable SDV and create the virtual device using the same name, there is no guarantee that
it will get the same pWWN again. Hence, you would have to rezone the pWWN-based zone. However,
if you perform zoning based on the device-alias name, there are no configuration changes required if or
when the pWWN changes.
Be sure you understand how device alias modes work before enabling them. Refer to Chapter 31,
Distributing Device Alias Services for details and requirements about device alias modes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Zone Enforcement
Zoning can be enforced in two ways: soft and hard. Each end device (N port or NL port) discovers other
devices in the fabric by querying the name server. When a device logs in to the name server, the name
server returns the list of other devices that can be accessed by the querying device. If an Nx port does
not know about the FC IDs of other devices outside its zone, it cannot access those devices.
In soft zoning, zoning restrictions are applied only during interaction between the name server and the
end device. If an end device somehow knows the FC ID of a device outside its zone, it can access that
device.
Hard zoning is enforced by the hardware on each frame sent by an Nx port. As frames enter the switch,
source-destination IDs are compared with permitted combinations to allow the frame at wirespeed. Hard
zoning is applied to all forms of zoning.
Note Hard zoning enforces zoning restrictions on every frame, and prevents unauthorized access.
Switches in the Cisco MDS 9000 Family support both hard and soft zoning.
Distributes the full zone set immediately. Does not distribute the full zone set immediately.
Does not distribute the full zone set information Remembers to distribute the full zone set
along with the active zone set during activation, information along with the active zone set during
deactivation, or merge process. activation, deactivation, and merge processes.
This section describes zone set distribution and includes the following topics:
Enabling Full Zone Set Distribution, page 30-26
Enabling a One-Time Distribution, page 30-27
About Recovering from Link Isolation, page 30-28
Importing and Exporting Zone Sets, page 30-28
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand a VSAN and select a zone set in the Logical Domains pane.
You see the zone set configuration in the Information pane. The Active Zones tab is the default.
Step 2 Click the Policies tab.
You see the configured policies for the zone (see Figure 30-27).
Step 3 In the Propagation column, choose fullZoneset from the drop-down menu.
Step 4 Click Apply Changes to propagate the full zone set.
This procedure only distributes the full zone set information; it does not save the information to the
startup configuration. You must explicitly save the running configuration to the startup configuration
issue the to save the full zone set information to the startup configuration.
Note The one-time distribution of the full zone set is supported in interop 2 and interop 3 modes, not in
interop 1 mode.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switch 1 Switch 2
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the Import Active Zoneset or the Export Active Zoneset radio button.
Step 3 Select the switch from which to import or export the zone set information from the drop-down list.
Step 4 Select the VSAN from which to import or export the zone set information from the drop-down list.
Step 5 Select the interface to use for the import process.
Step 6 Click OK to import or export the active zone set.
Note Issue the import and export from a single switch. Importing from one switch and exporting from
another switch can lead to isolation again.
Caution Copying an active zone set to a full zone set may overwrite a zone with the same name, if it already exists
in the full zone set database.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the Active or the Full radio button, depending on which type of database you want to copy.
Step 3 Select the source VSAN from the drop-down list.
Step 4 If you selected Copy Full, select the source switch and the destination VSAN from those drop-down
lists.
Step 5 Select the destination switch from the drop-down list.
Step 6 Click Copy to copy the database.
Caution If the Inter-VSAN Routing (IVR) feature is enabled and if IVR zones exist in the active zone set, then a
zone set copy operation copies all the IVR zones to the full zone database. To prevent copying to the IVR
zones, you must explicitly remove them from the full zone set database before performing the copy
operation. Refer to the Chapter 29, Configuring Inter-VSAN Routing for more information on the IVR
feature.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Backing Up Zones
To back up the full zone configuration using Fabric Manager, follow these steps:
Step 3 Choose File > Backup > This VSAN Zones to back up the existing zone configuration to a workstation
using TFTP, SFTP, SCP, or FTP.
You see the Backup Zone Configuration dialog box shown in Figure 30-32.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You can edit this configuration before backing up the data to a remote server.
Step 4 Provide the following Remote Options information to back up data onto a remote server:
a. UsingSelect the protocol.
b. Server IP AddressEnter the IP adress of the server.
c. UserNameEnter the name of the user.
d. PasswordEnter the password for the user.
e. File Name(Root Path)Enter the path and the filename.
Step 5 Click Backup or click Cancel to close the dialog box without backing up.
Restoring Zones
To restore the full zone configuration using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Choose File > Restore to restore a saved zone configuration using TFTP, SFTP, SCP or FTP.
You see the Restore Zone Configuration dialog box shown in Figure 30-34.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Click View Config to see information on how the zone configuration file from a remote server will be
restored. When you click Yes in this dialog box, you will be presented with the CLI commands that are
executed. To close the dialog box, click Close.
Note Backup and Restore options are available to switches that run Cisco NX-OS Release 4.1(3a) or later.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Clearing a zone set only erases the full zone database, not the active zone database.
Note After clearing the zone server database, you must explicitly copy the running configuration to the startup
configuration to ensure that the running configuration is used when the switch reboots.
Caution If zone-based QoS is implemented in a switch, you cannot configure the interop mode in that VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
Step 2 Click the Policies tab in the Information pane.
You see the Zone policy information in the Information pane (see Figure 30-37).
Step 3 Use the check boxes and drop-down menus to configure QoS on the default zone.
Step 4 Click Apply Changes to save the changes.
Note If a member is part of two zones with two different QoS priority attributes, the higher QoS value is
implemented. This situation does not arise in the VSAN-based QoS as the first matching entry is
implemented.
To configure the QoS priority attributes for a default zone using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Check the Permit QoS Traffic with Priority check box and set the Qos Priority drop-down menu to
low, medium, or high.
Step 5 Click OK to save these changes.
Step 4 Set the Policy drop-down menu to permit to permit traffic in the default zone, or set it to deny to block
traffic in the default zone.
Step 5 Click OK to save these changes.
Note Broadcast zoning is not supported on the Cisco Fabric Switch for HP c-Class BladeSystem and the Cisco
Fabric Switch for IBM BladeCenter.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You can configure broadcast frames in the basic zoning mode. By default, broadcast zoning is disabled
and broadcast frames are sent to all Nx ports in the VSAN. When enabled, broadcast frames are only
sent to Nx ports in the same zone, or zones, as the sender. Enable broadcast zoning when a host or storage
device uses this feature.
Table 30-2 identifies the rules for the delivery of broadcast frames.
Tip If any NL port attached to an FL port shares a broadcast zone with the source of the broadcast frame,
then the frames are broadcast to all devices in the loop.
Caution If broadcast zoning is enabled on a switch, you cannot configure the interop mode in that VSAN.
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
Step 2 Click the Policies tab in the Information pane.
You see the Zone policy information in the Information pane in Figure 30-40.
Step 3 Check the Broadcast check box to enable broadcast frames on the default zone.
Step 4 Click Apply Changes to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution LUN zoning can only be implemented in Cisco MDS 9000 Family switches. If LUN zoning is
implemented in a switch, you cannot configure the interop mode in that switch.
A storage device can have multiple LUNs behind it. If the device port is part of a zone, a member of the
zone can access any LUN in the device. With LUN zoning, you can restrict access to specific LUNs
associated with a device.
Note When LUN 0 is not included within a zone, then, as per standards requirements, control traffic to LUN
0 (for example, REPORT_LUNS, INQUIRY) is supported, but data traffic to LUN 0 (for example,
READ, WRITE) is denied.
Host H1 can access LUN 2 in S1 and LUN 0 in S2. It cannot access any other LUNs in S1 or S2.
Host H2 can access LUNs 1 and 3 in S1 and only LUN 1 in S2. It cannot access any other LUNs in
S1 or S2.
H1 S1
Zone 1 LUN 0
LUN 1
LUN 2
Zone 2 S1 LUN 3
Fabric
LUN 0
LUN 1
Zone 2 LUN 2
79540
H2 S2 LUN 3
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click the zone where you want to add members and click the Insert icon.
You see the Add Member to Zone dialog box shown in Figure 30-42.
Step 4 Click either the WWN or FCID radio button from the Zone By options to create a LUN-based zone.
Step 5 Check the LUN check box and click the browse button to configure LUNs.
Step 6 Click Add to add this LUN-based zone.
Note Refer to the relevant user manuals to obtain the LUN number for each HBA.
Caution If you make any errors when assigning LUNs, you might lose data.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Read-only volumes are not supported by some operating system and file system combinations (for
example, Windows NT or Windows 2000 and NTFS file system). Volumes within read-only zones
are not available to such hosts. However, if these hosts are already booted when the read-only zones
are activated, then read-only volumes are available to those hosts.
The read-only zone feature behaves as designed if either the FAT16 or FAT32 file system is used
with the previously mentioned Windows operating systems.
Step 4 Check the Read Only check box to create a read-only zone.
Step 5 Click OK.
Note To configure the read-only option for a default zone, see Configuring the Default Zone Policy section
on page 30-38.
Step 1 Expand a VSAN and select a zone set in the Logical Domains pane.
You see the zone configuration in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the Read Only Violations, Statistics tab, or LUN Zoning Statistics tab to view statistics for the
selected zone.
Enhanced Zoning
The zoning feature complies with the FC-GS-4 and FC-SW-3 standards. Both standards support the basic
zoning functionalities explained in the previous section and the enhanced zoning functionalities
described in this section.
This section includes the following topics:
About Enhanced Zoning, page 30-43
Changing from Basic Zoning to Enhanced Zoning, page 30-44
Changing from Enhanced Zoning to Basic Zoning, page 30-44
Enabling Enhanced Zoning, page 30-45
Creating Attribute Groups, page 30-45
Merging the Database, page 30-45
Analyzing a Zone Merge, page 30-46
Configuring Zone Merge Control Policies, page 30-47
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Verify that all switches in the fabric are capable of working in the enhanced mode.
If one or more switches are not capable of working in enhanced mode, then your request to move to
enhanced mode is rejected.
Step 2 Set the operation mode to enhanced zoning mode. By doing so, you will automatically start a session,
acquire a fabric wide lock, distribute the active and full zoning database using the enhanced zoning data
structures, distribute zoning policies and then release the lock. All switches in the fabric then move to
the enhanced zoning mode.
Tip After moving from basic zoning to enhanced zoning, we recommend that you save the running
configuration.
Step 1 Verify that the active and full zone set do not contain any configuration that is specific to the enhanced
zoning mode.
If such configurations exist, delete them before proceeding with this procedure. If you do not delete the
existing configuration, the Cisco NX-OS software automatically removes them.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Set the operation mode to basic zoning mode. By doing so, you will automatically start a session, acquire
a fabric wide lock, distribute the zoning information using the basic zoning data structure, apply the
configuration changes and release the lock from all switches in the fabric. All switches in the fabric then
move to basic zoning mode.
Note If a switch running Cisco SAN-OS Release 2.0(1b) and NX-OS 4(1b) or later, with enhanced
zoning enabled is downgraded to Cisco SAN-OS Release 1.3(4), or earlier, the switch comes up
in basic zoning mode and cannot join the fabric because all the other switches in the fabric are
still in enhanced zoning mode.
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
You see the zone set configuration in the Information pane.
Step 2 Click the Enhanced tab.
You see the current enhanced zoning configuration.
Step 3 From the Action drop-down menu, choose enhanced to enable enhanced zoning in this VSAN.
Step 4 Click Apply Changes to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Remove all non-pWWN-type zone entries on all MDS switches running Cisco SAN-OS prior to merging
fabrics if there is a Cisco MDS 9020 switch running FabricWare in the adjacent fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select the first switch to be analyzed from the Check Switch 1 drop-down list.
Step 3 Select the second switch to be analyzed from the And Switch 2 drop-down list.
Step 4 Enter the VSAN ID where the zone set merge failure occurred in the For Active Zoneset Merge Problems
in VSAN Id field.
Step 5 Click Analyze to analyze the zone merge.
Step 6 Click Clear to clear the analysis data in the Zone Merge Analysis dialog box.
Note A merge failure occurs when a switch supports more than 2000 zones per VSAN but its neighbor does
not. Also, zone set activation can fail if the switch has more than 2000 zones per VSAN and not all
switches in the fabric support more than 2000 zones per VSAN.
To compact the zone database for downgrading, refer to the Cisco MDS 9000 Family CLI Configuration
Guide.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 30-5 lists the default settings for basic zone parameters.
Parameters Default
Default zone policy Denied to all members.
Full zone set distribute The full zone set(s) is not distributed.
Zone based traffic priority Low.
Read-only zones Read-write attributes for all zones.
Broadcast frames Sent to all Nx ports.
Broadcast zoning Disabled.
Enhanced zoning Disabled.
CH A P T E R 31
Distributing Device Alias Services
All switches in the Cisco MDS 9000 Family support Distributed Device Alias Services (device alias) on
a per-VSAN basis and on a fabric-wide basis. Device alias distribution allows you to move host bus
adapters (HBAs) between VSANs without manually reentering alias names.
This chapter includes the following sections:
About Device Aliases, page 31-1
About Device Alias Modes, page 31-1
Device Alias Databases, page 31-4
Legacy Zone Alias Conversion, page 31-7
Device Alias Statistics Cleanup, page 31-8
Default Settings, page 31-9
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Because the device alias was previously running in the basic mode, the applications do not have any prior
native device alias configuration.
The applications check for an exisiting device alias cofiguration in the native format. If the device alias
is in the native format, the applications reject the request and device alias mode cannot be changed to
basic.
All native device alias configurations (both on local and remote switches) must be explicitly removed,
or all device alias members must be replaced with the corresponding pWWN before changing the mode
back to basic.
The process can be automated using the force option. Use the no device-alias mode enhanced force
command to enable applications to automatically replace all device alias members with the
corresponding pWWNs. If a device alias member does not have a corresponding pWWN mapping in the
device alias database, the configuration will be removed.
Note When all the switches are upgraded to Release 3.1, you cannot automatically convert to enhanced mode.
You do not need to change to enhanced mode, you can continue working in the basic mode.
At the application level, a merger takes place between the applications and the fabric. For example, zone
merge occurs when the E port is up and the IVR/PSM/DPVM merge occurs due to CFS. This merge is
completely independent of the device alias merge.
If the application running on an enhanced fabric has a native device alias configuration, the application
must fail the merge. The application has to fail the merge though the other fabric is capable of supporting
the native device alias based configuration, but running in the basic mode. You will need to resolve the
issue. Once the device alias merge issue is resolved, each application must be fixed accordingly.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The applications should not accept any native device alias configuration over SNMP if the device alias
is running in the basic mode on that particular switch.
Note Confcheck will be added when the enhanced mode is turned on and removed when it is turned off.
Applications have to add confcheck if they have a device alias configuration in the native format. They
have to remove confcheck once the configuration is removed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
1 to 9
- (hyphen) and _ (underscore)
$ (dollar sign) and ^ (up caret)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand End Devices and then select Device Alias in the Physical Attributes pane.
You see the device alias configuration in the Information pane Figure 31-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand End Devices and then select Device Alias in the Physical Attributes pane.
You see the device alias configuration in the Information pane.
Step 2 Click the Configuration tab and click the Create Row icon.
You see the Device Alias Creation dialog box in Figure 31-2.
Committing Changes
If you commit the changes made to the pending database, the following events occur:
1. The pending database contents overwrites the effective database contents.
2. The pending database is emptied of its contents.
3. The fabric lock is released for this feature.
To commit the changes to the device alias database using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand End Devices and then select Device Alias in the Physical Attributes pane.
You see the device alias configuration in the Information pane. The CFS tab is the default tab.
Step 2 Select enable from the Global drop-down menus to enabled switch aliases.
Step 3 Select commit from the Config Action drop-down menu for the newly enabled switches.
Step 4 Click Apply Changes to commit and distribute these changes or click Undo Changes to discard any
unsaved changes.
Discarding Changes
If you discard the changes made to the pending database, the following events occur:
1. The effective database contents remain unaffected.
2. The pending database is emptied of its contents.
3. The fabric lock is released for this feature.
To discard the device alias session using Fabric Manager, follow these steps:
Step 1 Expand End Devices and then select Device Alias in the Physical Attributes pane.
You see the device alias configuration in the Information pane. The CFS tab is the default tab.
Step 2 Select abort from the Config Action drop-down menu.
Step 3 Click Apply Changes to discard the session.
Tip Ensure to copy any required zone aliases to the device alias database as required by your configuration.
When an import operation is complete, the modified alias database is distributed to all other switches in
the physical fabric when you perform the commit operation. At this time if you do not want to distribute
the configuration to other switches in the fabric, you can perform the abort operation and the merge
changes are completely discarded.
This section includes the following topics:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 For each fabric that you are monitoring with Fabric Manager Server, check the Device Alias check box
to use global device aliases, or uncheck to use FC aliases.
Step 3 Click Apply to save these changes or click Close to exit the dialog box without saving any changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 31-2 lists the default settings for device alias parameters.
Parameters Default
Database in use Effective database.
Database to accept changes Pending database.
Device alias fabric lock state Locked with the first device alias task.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 32
Configuring Fibre Channel Routing Services and
Protocols
Fabric Shortest Path First (FSPF) is the standard path selection protocol used by Fibre Channel fabrics.
The FSPF feature is enabled by default on all Fibre Channel switches. Except in configurations that
require special consideration, you do not need to configure any FSPF services. FSPF automatically
calculates the best path between any two switches in a fabric. Specifically, FSPF is used to:
Dynamically compute routes throughout a fabric by establishing the shortest and quickest path
between any two switches.
Select an alternative path in the event of the failure of a given path. FSPF supports multiple paths
and automatically computes an alternative path around a failed link. It provides a preferred route
when two equal paths are available.
This chapter provides details on Fibre Channel routing services and protocols. It includes the following
sections:
About FSPF, page 32-2
FSPF Global Configuration, page 32-4
FSPF Interface Configuration, page 32-6
FSPF Routes, page 32-12
In-Order Delivery, page 32-15
Default Settings, page 32-19
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
About FSPF
FSPF is the protocol currently standardized by the T11 committee for routing in Fibre Channel networks.
The FSPF protocol has the following characteristics and features:
Supports multipath routing.
Bases path status on a link state protocol.
Routes hop by hop, based only on the domain ID.
Runs only on E ports or TE ports and provides a loop free topology.
Runs on a per VSAN basis. Connectivity in a given VSAN in a fabric is guaranteed only for the
switches configured in that VSAN.
Uses a topology database to keep track of the state of the links on all switches in the fabric and
associates a cost with each link.
Guarantees a fast reconvergence time in case of a topology change. Uses the standard Dijkstra's
algorithm, but there is a static dynamic option for a more robust, efficient, and incremental Dijkstra's
algorithm. The reconvergence time is fast and efficient as the route computation is done on a per
VSAN basis.
FSPF Examples
This section provides examples of topologies and applications that demonstrate the benefits of FSPF.
A B C
79541
D E
For example, if all links are of equal speed, the FSPF calculates two equal paths from A to C: A-D-C
(green) and A-E-C (blue).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Redundant Links
To further improve on the topology in Figure 32-1, each connection between any pair of switches can be
replicated; two or more links can be present between a pair of switches. Figure 32-2 shows this
arrangement. Because switches in the Cisco MDS 9000 Family support PortChanneling, each pair of
physical links can appear to the FSPF protocol as one single logical link.
By bundling pairs of physical links, FSPF efficiency is considerably improved by the reduced database
size and the frequency of link updates. Once physical links are aggregated, failures are not attached to a
single link but to the entire PortChannel. This configuration also improves the resiliency of the network.
The failure of a link in a PortChannel does not trigger a route change, thereby reducing the risks of
routing loops, traffic loss, or fabric downtime for route reconfiguration.
A B C
1
2
4 3
79542
D E
For example, if all links are of equal speed and no PortChannels exist, the FSPF calculates four equal
paths from A to C: A1-E-C, A2-E-C, A3-D-C, and A4-D-C. If PortChannels exist, these paths are
reduced to two.
Switch 1 Switch 2
Table 32-1 Physically Removing the Cable for the SmartBits Scenario
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 32-2 Shutting Down the Switch for the SmartBits Scenario
Note FSPF is enabled by default. Generally, you do not need to configure these advanced features.
Caution The default for the backbone region is 0 (zero). You do not need to change this setting unless your region
is different from the default. If you are operating with other vendors using the backbone region, you can
change this default to be compatible with those settings.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The LSR minimum arrival time is the period between receiving LSR updates on this VSAN. Any LSR
updates that arrive before the LSR minimum arrival time are discarded.
The LSR minimum interval time is the frequency at which this switch sends LSR updates on a VSAN.
Step 1 Expand a Fabric, expand a VSAN and select FSPF for a VSAN that you want to configure for FSPF.
You see the FSPF configuration in the Information pane as shown in Figure 32-4.
Step 2 The RegionID, Spf Comp Holdtime, LSR Min Arrival, and LSR Min Interval field values are applied
across all interfaces on the VSAN. You can change them here or, if they do not exist create them here.
Step 3 Click Apply Changes to save these changes, or click Undo Changes to discard any unsaved changes.
Step 1 Expand a Fabric, expand a VSAN and select FSPF for a VSAN that you want to configure for FSPF.
You see the FSPF configuration in the Information pane as shown in Figure 32-4.
Step 2 Check the SetToDefault check box for a switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click Apply Changes to save these changes, or click Undo Changes to discard any unsaved changes.
Step 1 Expand a Fabric, expand a VSAN and select FSPF for a VSAN that you want to configure for FSPF.
You see the FSPF configuration in the Information pane as shown in Figure 32-4.
Step 2 Set the Status Admin drop-down menu to up to enable FSPF or to down to disable FSPF.
Step 3 Click Apply Changes to save these changes, or click Undo Changes to discard any unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Double-click in the Cost field of a switch and change the value.
Step 4 Click Apply Changes to save these changes, or click Undo Changes to discard any unsaved changes.
Note This value must be the same in the ports at both ends of the ISL.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note This value must be the same in the ports at both ends of the ISL.
Caution An error is reported at the command prompt if the configured dead time interval is less than the hello
time interval.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note This value must be the same on the switches on both ends of the interface.
Note FSPF must be enabled at both ends of the interface for the protocol to work.
You can disable the FSPF protocol for selected interfaces. By default, FSPF is enabled on all E ports and
TE ports. This default can be disabled by setting the interface as passive.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand a Fabric, expand a VSAN, and then select FSPF in the Logical Domains pane.
You see the FSPF configuration dialog box.
Step 2 Click the Statistics tab.
You see the FSPF VSAN statistics in the Information pane (see Figure 32-8).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FSPF Routes
FSPF routes traffic across the fabric, based on entries in the FSPF database. These routes can be learned
dynamically, or configured statically.
This section includes the following topics:
About Fibre Channel Routes, page 32-12
Configuring Fibre Channel Routes, page 32-12
About Broadcast and Multicast Routing, page 32-14
About Multicast Root Switch, page 32-14
Setting the Multicast Root Switch, page 32-14
Domain ID 7
fc1/1
Domain ID 1 Domain ID 3
79944
FC ID 111211
Note Other than in VSANs, runtime checks are not performed on configured and suspended static routes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select the VSAN ID that for which you are configuring this route.
Step 4 Fill in the destination address and destination mask for the device you are configuring a route.
Step 5 Select the interface that you want to use to reach this destination.
Step 6 Select the next hop domain ID and route metric.
Step 7 Select either the local or remote radio button.
Step 8 Click Create to save these changes, or click Close to discard any unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution All switches in the fabric should run the same multicast and broadcast distribution tree algorithm to
ensure the same distribution tree.
To interoperate with other vendor switches (following FC-SW3 guidelines), the SAN-OS and NX-OS
4.1(1b) and later software uses the lowest domain switch as the root to compute the multicast tree in
interop mode.
Note The operational mode can be different from the configured interop mode. The interop mode always uses
the lowest domain switch as the root.
Step 1 Expand a fabric, expand a VSAN, and then select Advanced for the VSAN that you want to configure
FSPF on.
You see the advanced Fibre Channel configuration in the Information pane.
Step 2 Select the Multicast Root tab.
You see the multicast root configuration in the Information pane as shown in Figure 32-12.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In-Order Delivery
In-Order Delivery (IOD) of data frames guarantees frame delivery to a destination in the same order that
they were sent by the originator.
Some Fibre Channel protocols or applications cannot handle out-of-order frame delivery. In these cases,
switches in the Cisco MDS 9000 Family preserve frame ordering in the frame flow. The source ID (SID),
destination ID (DID), and optionally the originator exchange ID (OX ID) identify the flow of the frame.
On any given switch with IOD enabled, all frames received by a specific ingress port and destined to a
certain egress port are always delivered in the same order in which they were received.
Use IOD only if your environment cannot support out-of-order frame delivery.
Tip If you enable the in-order delivery feature, the graceful shutdown feature is not implemented.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Old path
Switch 1 Switch 2 Switch 3
Frame 2 Frame 1 New path
Frame 4 Frame 3
85474
Switch 4
In Figure 32-13, the new path from Switch 1 to Switch 4 is faster. In this scenario, Frame 3 and Frame
4 may be delivered before Frame 1 and Frame 2.
If the in-order guarantee feature is enabled, the frames within the network are treated as follows:
Frames in the network are delivered in the order in which they are transmitted.
Frames that cannot be delivered in order within the network latency drop period are dropped inside
the network.
Old path
Switch 1 Switch 2
Frame 2 Frame 1 New path
Frame 4 Frame 3
85475
In Figure 32-14, the port of the old path (red dot) is congested. In this scenario, Frame 3 and Frame 4
can be delivered before Frame 1 and Frame 2.
The in-order delivery feature attempts to minimize the number of frames dropped during PortChannel
link changes when the in-order delivery is enabled by sending a request to the remote switch on the
PortChannel to flush all frames for this PortChannel.
Note Both switches on the PortChannel must be running Cisco SAN-OS Release 3.0(1) for this IOD
enhancement. For earlier releases, IOD waits for the switch latency period before sending new frames.
When the in-order delivery guarantee feature is enabled and a PortChannel link change occurs, the
frames crossing the PortChannel are treated as follows:
Frames using the old path are delivered before new frames are accepted.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The new frames are delivered through the new path after the switch latency drop period has elapsed
and all old frames are flushed.
Frames that cannot be delivered in order through the old path within the switch latency drop period are
dropped. See the Configuring the Drop Latency Time section on page 32-18.
Tip We recommend that you only enable this feature when devices that cannot handle any out-of-order
frames are present in the switch. Load-balancing algorithms within the Cisco MDS 9000 Family ensure
that frames are delivered in order during normal fabric operation. The load-balancing algorithms based
on source FC ID, destination FC ID, and exchange ID are enforced in hardware without any performance
degradation. However, if the fabric encounters a failure and this feature is enabled, the recovery will be
delayed because of an intentional pausing of fabric forwarding to purge the fabric of resident frames that
could potentially be forwarded out-of-order.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Enable in-order delivery on the entire switch before performing a downgrade to Cisco MDS SAN-OS
Release 1.3(3) or earlier.
Step 3 Check the InOrder Delivery check box to enable IOD for the switch.
Step 4 Click Apply Changes to save these changes, or click Undo Changes to discard any unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Double-click the Network Latency field and change the value.
Step 4 Click Apply Changes to save these changes, or click Undo Changes to discard any unsaved changes.
Default Settings
Table 32-4 lists the default settings for FSPF features.
Parameters Default
FSPF Enabled on all E ports and TE ports.
SPF computation Dynamic.
SPF hold time 0.
Backbone region 0.
Acknowledgment interval (RxmtInterval) 5 seconds.
Refresh time (LSRefreshTime) 30 minutes.
Maximum age (MaxAge) 60 minutes.
Hello interval 20 seconds.
Dead interval 80 seconds.
Distribution tree information Derived from the principal switch (root node).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
Routing table FSPF stores up to 16 equal cost paths to a given
destination.
Load balancing Based on destination ID and source ID on different, equal
cost paths.
In-order delivery Disabled.
Drop latency Disabled.
Static route cost If the cost (metric) of the route is not specified, the
default is 10.
Remote destination switch If the remote destination switch is not specified, the
default is direct.
Multicast routing Uses the principal switch to compute the multicast tree.
CH A P T E R 33
Dense Wavelength Division Multiplexing
About DWDM
Dense Wavelength-Division Multiplexing (DWDM) multiplexes multiple optical carrier signals on a
single optical fiber. DWDM uses different wavelengths to carry various signals.
To establish a DWDM link, both ends of an Inter Switch Link (ISL) need to be connected with DWDM
SPFs (small form-factor pluggable) at each end of the link. To identify a DWDM link, Fabric Manager
discovers the connector type on the Fiber Channel (FC) ports. If the ISL link is associated with the FC
ports at each end, then the FC port uses DWDM SFP to connect the links.
Fabric Manager Server discovers FC ports with DWDM SFPs and the ISLs associated with the FC ports.
The Fabric Manager Client displays ISL with DWDM attribute on the topology map.
Note The FSPF (Fabric Shortest Path First) database only displays an ISL link, which is connected with
DWDM SPFs at both ends.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 The ISLs Physical table displays the connector type as sfpDwdm as shown in Figure 33-2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Move the mouse over the link to see the tooltip as DWDM indicating the link type as shown in
Figure 33-3.
Step 6 Perform a Dump Discovery of ISL to list all ISLs. DWDM links are listed with [DWDM] as shown in
Figure 33-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 34
Managing FLOGI, Name Server, FDMI, and RSCN
Databases
This chapter describes the fabric login database, the name server features, the Fabric-Device
Management Interface, and Registered State Change Notification (RSCN) information provided in the
Cisco MDS 9000 Family. It includes the following sections:
FLOGI, page 34-1
Displaying FLOGI Details, page 34-1
Name Server Proxy, page 34-2
FDMI, page 34-4
Displaying FDMI, page 34-4
RSCN, page 34-5
Default Settings, page 34-8
FLOGI
In a Fibre Channel fabric, each host or disk requires an FC ID. If the required device is displayed in the
FLOGI table, the fabric login is successful. Examine the FLOGI database on a switch that is directly
connected to the host HBA and connected ports. See the Default Company ID list section on page 37-8
and the Switch Interoperability section on page 37-8.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Double-click the PortName field to register a new name server proxy.
Step 4 Click Apply Changes to save these changes, or click Undo Changes to cancel any unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The General tab is the default tab; you see the name server database.
Step 2 Click the Statistics tab.
You see the name server statistics.
Step 3 Click Close to close the dialog box.
FDMI
Cisco MDS 9000 Family switches provide support for the Fabric-Device Management Interface (FDMI)
functionality, as described in the FC-GS-4 standard. FDMI enables management of devices such as Fibre
Channel Host Bus Adapters (HBAs) through in-band communications. This addition complements the
existing Fibre Channel name server and management server functions.
Using the FDMI functionality, the NX-OS software can extract the following management information
about attached HBAs and host operating systems without installing proprietary host agents:
Manufacturer, model, and serial number
Node name and node symbolic name
Hardware, driver, and firmware versions
Host operating system (OS) name and version number
All FDMI entries are stored in persistent storage and are retrieved when the FDMI process is started.
Displaying FDMI
To display the FDMI database information using Device Manager, choose FC > Advanced > FDMI.
You see the FDMI dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
RSCN
The Registered State Change Notification (RSCN) is a Fibre Channel service that informs hosts about
changes in the fabric. Hosts can receive this information by registering with the fabric controller
(through SCR). These notifications provide a timely indication of one or more of the following events:
Disks joining or leaving the fabric.
A name server registration change.
A new zone enforcement.
IP address change.
Any other similar event that affects the operation of the host.
This section includes the following topics:
About RSCN Information, page 34-5
Displaying RSCN Information, page 34-5
About the multi-pid Option, page 34-6
Configuring the multi-pid Option, page 34-6
Clearing RSCN Statistics, page 34-7
RSCN Timer Configuration Distribution Using CFS, page 34-7
Configuring the RSCN Timer with CFS, page 34-8
Note The switch sends an RSCN to notify registered nodes that a change has occurred. It is up to the nodes to
query the name server again to obtain the new information. The details of the changed information are
not delivered by the switch in the RSCN sent to the nodes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Some Nx ports may not understand multi-pid RSCN payloads. If so, disable the RSCN multi-pid option.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note All configuration commands are not distributed. Only the rscn event-tov tov vsan vsan command is
distributed.
The RSCN timer is registered with CFS during initialization and switchover. For high availability, if the
RSCN timer distribution crashes and restarts or a switchover occurs, it resumes normal functionality
from the state prior to the crash or switchover.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Before performing a downgrade, make sure that you revert the RCSN timer value in your network to the
default value. Failure to do so will disable the links across your VSANs and other devices.
Compatibility across various Cisco MDS NX-OS releases during an upgrade or downgrade is supported
by conf-check provided by CFS. If you attempt to downgrade from Cisco MDS SAN-OS Release 3.0,
you are prompted with a conf-check warning. You are required to disable RSCN timer distribution
support before you downgrade.
By default, the RSCN timer distribution capability is disabled and is therefore compatible when
upgrading from any Cisco MDS SAN-OS release earlier than Release 3.0.
Step 1 Expand a fabric, expand a VSAN and then select Advanced in the Logical Domains pane.
Step 2 Select the RSCN Event tab.
You see the VSAN advanced configuration in the Information pane shown in Figure 34-6.
Step 3 Double-click the TimeOut value to change the value (in milliseconds) for the selected VSAN.
Step 4 Click Apply Changes to save these changes, or click Undo Changes to cancel any unsaved changes.
Default Settings
Table 34-1 lists the default settings for RSCN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
RSCN timer value 2000 milliseconds for Fibre Channel VSANs
1000 milliseconds for FICON VSANs
RSCN timer configuration distribution Disabled
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 35
Discovering SCSI Targets
This chapter describes the SCSI LUN discovery feature provided in switches in the Cisco MDS 9000
Family. It includes the following sections:
About SCSI LUN Discovery, page 35-1
Displaying SCSI LUN Information, page 35-3
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Click the VSAN drop-down menu and select the VSAN in which you want to initiate a customized
discovery.
Step 2 Click FC > Advanced > LUNs.
You see the LUN Configuration dialog box.
Step 3 Set StartDiscovery to local, remote or both.
Step 4 Fill in the DiscoveryType and OS fields.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 36
Configuring FICON
Fibre Connection (FICON) interface capabilities enhance the Cisco MDS 9000 Family by supporting
both open systems and mainframe storage network environments. Inclusion of Control Unit Port (CUP)
support further enhances the MDS offering by allowing in-band management of the switch from FICON
processors.
The fabric binding feature helps prevent unauthorized switches from joining the fabric or disrupting
current fabric operations (see Chapter 47, Configuring Fabric Binding). The Registered Link Incident
Report (RLIR) application provides a method for a switch port to send an LIR to a registered Nx port.
Note Cisco Fabric Manager release 3.x does not support FICON management of Cisco MDS 9000 Family
switches running SAN-OS release 2.(x).
About FICON
The FICON feature is not supported on:
Cisco MDS 9120 switches
Cisco MDS 9124 switches
Cisco MDS 9140 switches
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FICON VSAN
Mainframe Control
systems unit
Open Open
systems storage
105211
FCP and FICON are different FC4 protocols and their traffic is independent of each other. Devices using
these protocols should be isolated using VSANs.
This section includes the following topics:
FICON Requirements, page 36-2
MDS-Specific FICON Advantages, page 36-3
FICON Cascading, page 36-7
FICON VSAN Prerequisites, page 36-7
FICON Requirements
The FICON feature has the following requirements:
You can implement FICON features in the following switches:
Any switch in the Cisco MDS 9500 Series.
Any switch in the Cisco MDS 9200 Series (including the Cisco MDS 9222i Multiservice
Modular Switch).
Cisco MDS 9134 Multilayer Fabric Switch.
MDS 9000 Family 18/4-Port Multiservice Module.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You need the MAINFRAME_PKG license to configure FICON parameters. To extendyour FICON
configuration over a WAN link using FCIP, you need the appropriate SAN_EXTN_OVER_IP
license for the module you are using. For more information, see Chapter 10, Obtaining and
Installing Licenses.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
105212
VSANs enable global SAN consolidation by allowing you to convert existing SAN islands into virtual
SAN islands on a single physical network. It provides hardware-enforced security and separation
between applications or departments to allow coexistence on a single network. It also allows virtual
rewiring to consolidate your storage infrastructure. You can move assets between departments or
applications without the expense and disruption of physical relocation of equipment.
Note While you can configure VSANs in any Cisco MDS switch, you can enable FICON in at most eight of
these VSANs. The number of VSANs configured depends on the platform.
Note Mainframe users can think of VSANs as being like FICON LPARs in the MDS SAN fabric. You can
partition switch resources into FICON LPARs (VSANs) that are isolated from each other, in much the
same way that you can partition resources on a zSeries or DS8000. Each VSAN has its own set of fabric
services (such as fabric server and name server), FICON Control Unit Port, domain ID, Fabric Shortest
Path First (FSPF) routing, operating mode, IP address, and security profile.
FICON LPARs can span line cards and are dynamic in size. For example, one FICON LPAR with 10
ports can span 10 different line cards. FICON LPARs can also include ports on more than one switch in
a cascaded configuration. The consistent fairness of the Cisco MDS 9000 switching architecture means
that all ports are created equal, simplifying provisioning by eliminating the local switching issues
seen on other vendors platforms.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Addition of ports to a FICON LPAR is a nondisruptive process. The maximum number of ports for a
FICON LPAR is 255 due to FICON addressing limitations.
FCIP Support
The multilayer architecture of the Cisco MDS 9000 Family enables a consistent feature set over a
protocol-agnostic switch fabric. Cisco MDS 9500 Series and 9200 Series switches transparently
integrate Fibre Channel, FICON, and Fibre Channel over IP (FCIP) in one system. The FICON over
FCIP feature enables cost-effective access to remotely located mainframe resources. With the Cisco
MDS 9000 Family platform, storage replication services such as IBM PPRC and XRC can be extended
over metro to global distances using ubiquitous IP infrastructure and thus simplifies business
continuance strategies.
See Chapter 48, Configuring FCIP.
PortChannel Support
The Cisco MDS implementation of FICON provides support for efficient utilization and increased
availability of Inter-Switch Links (ISLs) necessary to build stable large-scale SAN environments.
PortChannels ensure an enhanced ISL availability and performance in Cisco MDS switches.
See Chapter 23, Configuring PortChannels for more information on PortChannels.
Tip When creating a mixed environment, place all FICON devices in one VSAN (other than the default
VSAN) and segregate the FCP switch ports in a separate VSAN (other than the default VSAN). This
isolation ensures proper communication for all connected devices.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Refer to the Cisco MDS 9500 Series Hardware Installation Guide and the Cisco MDS 9200 Series
Hardware Installation Guide.
High-availability FICON-enabled directorThe Cisco MDS 9500 Series combines nondisruptive
software upgrades, stateful process restart and failover, and full redundancy of all major components
for a new standard in director-class availability. It supports up to 528 autosensing, 4/2/1-Gbps,
10-Gbps, FICON or FCP ports in any combination in a single chassis. See Chapter 17, Configuring
High Availability.
Infrastructure protectionCommon software releases provide infrastructure protection across all
Cisco MDS 9000 platforms. See Chapter 15, Software Images.
VSAN technologyThe Cisco MDS 9000 Family provides VSAN technology for
hardware-enforced, isolated environments within a single physical fabric for secure sharing of
physical infrastructure and enhanced FICON mixed support. See Chapter 26, Configuring and
Managing VSANs.
Port-level configurationsThere are BB_credits, beacon mode, and port security for each port. See
the About Buffer-to-Buffer Credits section on page 20-26, Identifying the Beacon LEDs section
on page 20-19, and Chapter 24, Configuring Trunking.
Alias name configurationProvides user-friendly aliases instead of the WWN for switches and
attached node devices. See Chapter 30, Configuring and Managing Zones.
Comprehensive security frameworkThe Cisco MDS 9000 Family supports RADIUS and
TACACS+ authentication, Simple Network Management Protocol Version 3 (SNMPv3), role-based
access control, Secure Shell Protocol (SSH), Secure File Transfer Protocol (SFTP), VSANs,
hardware-enforced zoning, ACLs, fabric binding, Fibre Channel Security Protocol (FC-SP), LUN
zoning, read-only zones, and VSAN-based access control. See Chapter 41, Configuring RADIUS
and TACACS+ Chapter 45, Configuring FC-SP and DHCHAP, and Chapter 47, Configuring
Fabric Binding.
Traffic encryptionIPSec is supported over FCIP. You can encrypt FICON and Fibre Channel
traffic that is carried over FCIP. See Chapter 44, Configuring IPsec Network Security.
Local accounting logView the local accounting log to locate FICON events. See the MSCHAP
Authentication section on page 41-24 and Local AAA Services section on page 41-26.
Unified storage managementCisco MDS 9000 FICON-enabled switches are fully IBM CUP
standard compliant for in-band management using the IBM S/A OS/390 I/O operations console. See
the CUP In-Band Management section on page 36-37.
Port address-based configurationsConfigure port name, blocked or unblocked state, and the
prohibit connectivity attributes. See the Configuring FICON Ports section on page 36-24.
You can display the following information:
Individual Fibre Channel ports, such as the port name, port number, Fibre Channel address,
operational state, type of port, and login data.
Nodes attached to ports.
Port performance and statistics.
See the Calculating FICON Flow Load Balance section on page 36-39.
Configuration filesStore and apply configuration files. See the FICON Configuration Files
section on page 36-28.
FICON and Open Systems Management Server features if installed. See the VSANs for FICON
and FCP Mixing section on page 36-5.
Enhanced cascading supportSee the CUP In-Band Management section on page 36-37.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Date and timeSet the date and time on the switch. See the Allowing the Host to Control the
Timestamp section on page 36-22.
Configure SNMP trap recipients and community namesSee the Configuring SNMP Control of
FICON Parameters section on page 36-22.
Call Home configurationsConfigure the director name, location, description, and contact person.
See Chapter 62, Configuring Call Home.
Configure preferred domain ID, FC ID persistence, and principal switch prioritySee Chapter 25,
Configuring Domain Parameters.
Sophisticated SPAN diagnosticsThe Cisco MDS 9000 Family provides industry-first intelligent
diagnostics, protocol decoding, and network analysis tools as well as integrated Call Home
capability for added reliability, faster problem resolution, and reduced service costs. See Chapter 60,
Monitoring Network Traffic Using SPAN.
Configure R_A_TOV, E_D_TOV See the Fibre Channel Time Out Values section on
page 37-2.
Director-level maintenance tasksPerform maintenance tasks for the director including
maintaining firmware levels, accessing the director logs, and collecting data to support failure
analysis. See Chapter 68, Monitoring System Processes and Logs.
FICON Cascading
The Cisco MDS NX-OS software allows multiple switches in a FICON network. To configure multiple
switches, you must enable and configure fabric binding in that switch (see the Calculating FICON Flow
Load Balance section on page 36-39).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You must enable FICON on the switch before reserving FICON port number (see the About Enabling
FICON on a VSAN section on page 36-17).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 36-3 Default FICON Port Number in Numbering on the Cisco MDS 9000 Family Switch
105217
The default FICON port number is assigned based on the front panel location of the port and is specific
to the slot in which the module resides. Thirty-two (32) port numbers are assigned to each slot on all
Cisco MDS 9000 Family switches except for the Cisco MDS 9513 Director, which has 16 port numbers
assigned for each slot. These default numbers are assigned regardless of the modules physical presence
in the chassis, the port status (up or down), or the number of ports on the module (4, 12, 16, 24, or 48).
If a module has fewer ports than the number of port numbers assigned to the slot, then the excess port
numbers are unused. If a module has more ports than the number of port numbers assigned to the slot,
the excess ports cannot be used for FICON traffic unless you manually assign the port numbers.
Note Follow the steps in Assigning FICON Port Numbers to Slots section on page 36-13 to make use of
excess ports by manually assigning more port numbers to the slot. Before doing this, however, we
recommend that you review the default port number assignments for Cisco MDS 9000 switches shown
in Table 36-3 on page 36-42, and that you read the following sections to gain a complete understanding
of FICON port numbering: About the Reserved FICON Port Numbering Scheme section on
page 36-11, FICON Port Numbering Guidelines section on page 36-12, and Assigning FICON Port
Numbers to Slots section on page 36-13.
Note Only Fibre Channel, PortChannel, and FCIP ports are mapped to FICON port numbers. Other types of
interfaces do not have a corresponding port number.
Table 36-3 lists the default port number assignment for the Cisco MDS 9000 Family of switches and
directors.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 36-1 Default FICON Port Numbering in the Cisco MDS 9000 Family
Cisco MDS Slot 1 0 through 31 64 through 89 90 through 253 The first 4, 12, 16, or 24 port
9222i Series Slot 2 32 through 63 and port 255 numbers in a 4-port, 12-port,
16-port, or 24-port module are
used and the rest remain
unused. Extra 16 ports on
48-port modules are not
allocated numbers.
Cisco MDS Slot 1 0 through 31 128 through 153 154 through 253 Supervisor modules are not
9506 Director Slot 2 32 through 63 and port 255 allocated port numbers.
Slot 3 64 through 95
Slot 4 96 through 127
Slot 5 None
Slot 6 None
Cisco MDS Slot 1 0 through 33 34 through 59 60 through 253
9134 Director and port 255
Cisco MDS Slot 1 0 through 31 224 through 249 250 through 253 The first 4, 12, 16, or 24 port
9509 Director Slot 2 32 through 63 and port 255 numbers in a 4-port, 12-port,
16-port, or 24-port module are
Slot 3 64 through 95 used and the rest remain
Slot 4 96 through 127 unused. Extra 16 ports on
48-port modules are not
allocated port numbers.
Slot 5 None Supervisor modules are not
Slot 6 None allocated port numbers.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 36-1 Default FICON Port Numbering in the Cisco MDS 9000 Family (continued)
Port Addresses
By default, port numbers are the same as port addresses. You can swap the port addresses (see the Port
Swapping section on page 36-31).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note FICON port numbers are not changed for ports that are active. You must first disable the interfaces using
the shutdown command.
Note You can configure port numbers even when no module is installed in the slot.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution When you assign, change, or release a port number, the port reloads.
To assign FICON port numbers to slots using Device Manager, follow these steps:
Step 2 Enter the chassis slot port numbers in the Reserved Port Numbers field.
Step 3 Click Apply.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Enter the chassis slot port numbers. These are the reserved port numbers for one chassis slot. There can
be up to 64 port numbers reserved for each slot in the chassis.
Step 4 Click Apply.
FC ID Allocation
FICON requires a predictable and static FC ID allocation scheme. When FICON is enabled, the FC ID
allocated to a device is based on the port address of the port to which it is attached. The port address
forms the middle byte of the fabric address. Additionally, the last byte of the fabric address should be
the same for all devices in the fabric. By default, the last byte value is 0 and can be configured (see the
Assigning FC ID Last Byte section on page 36-20).
Cisco MDS switches have a dynamic FC ID allocation scheme. When FICON is enabled or disabled on
a VSAN, all the ports are shut down and restarted to switch from the dynamic to static FC IDs and vice
versa (see Figure 36-6).
5 0x44 0
113134
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Configuring FICON
By default FICON is disabled in all switches in the Cisco MDS 9000 Family. You can enable FICON on
a per VSAN basis by using the Device Manager.
This section includes the following topics:
About Enabling FICON on a VSAN, page 36-15
Setting Up a Basic FICON Configuration, page 36-16
Manually Enabling FICON on a VSAN, page 36-18
Deleting FICON VSANs, page 36-18
Suspending a FICON VSAN, page 36-19
Configuring the code-page Option, page 36-19
Assigning FC ID Last Byte, page 36-20
Allowing the Host to Move the Switch Offline, page 36-21
Allowing the Host to Change FICON Port Parameters, page 36-22
Allowing the Host to Control the Timestamp, page 36-22
Configuring SNMP Control of FICON Parameters, page 36-22
FICON Information Refresh, page 36-23
About FICON Device Allegiance, page 36-23
Automatically Saving the Running Configuration, page 36-23
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip Using Device Manager, FICON auto-save can be invoked by multiple users logged on to the same
FICON-enabled switch. Device Manager performs a periodic auto-save on any FICON-enabled switch
causing increments in the FICON key counter. These increments highlight a change that has actually not
occurred. To avoid this we recommend that only one instance of Device Manager monitor a
FICON-enabled switch.
You see the Create VSAN dialog box (see Figure 36-8).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 Check the option, if appropriate, to enable fabric binding for the selected switches.
Step 8 Check the All Ports Prohibited option if all ports in this VSAN are prohibited.
Step 9 Click Create to create the VSAN.
Step 10 Choose Tools > Device Manager to open Device Manager for each switch in the FICON VSAN.
Step 11 Click FC > VSANs.
You see the VSAN dialog box (see Figure 36-9).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note This section describes the procedure to manually enable FICON on a VSAN. If you have already enabled
FICON on the required VSAN using the automated setup (recommended), skip to the Automatically
Saving the Running Configuration section on page 36-23.
To manually enable FICON on a VSAN using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click anywhere in the row of the VSAN that you want to delete.
Step 3 Click Delete Row to delete the VSAN.
Note Deleting the VSAN will also delete the associated FICON configuration file, and the file cannot
be recovered.
Note This command can be issued by the host if the host is allowed to do so (see the Allowing the Host to
Move the Switch Offline section on page 36-21).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip This is an optional configuration. If you are not sure of the EBCDIC format to be used, we recommend
retaining the us-canada (default) option.
To modify the code-page option using Device Manager, follow these steps:
Step 2 Choose an option from the CodePage drop-down menu for the FICON VSAN you want to configure
(US-Canada is configured in Figure 36-11).
Step 3 Click Apply to save the changes.
Caution If the FICON feature is configured in cascaded mode, the Cisco MDS switches use ISLs to connect to
other switches.
To assign the last byte for the FC ID using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select single in the Mask column and then assign the entire FC ID at once. The single option allows you
to enter the FC ID in the ###### format.
Step 4 Click the Apply Changes icon to save these changes.
Step 3 Check the Host Can Offline Sw check box to allow the mainframe to move a switch to the offline state.
Step 4 Check the Host Can Sync Time check box to allow the mainframe to set the system time on the switch.
Step 5 Click the Apply Changes icon to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you disable SNMP in the Cisco MDS switch, you cannot configure FICON parameters using the Fabric
Manager.
To configure SNMP control of FICON parameters using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FICON-specific configuration changes are immediately saved to the IPL file (see the FICON
Configuration Files section on page 36-28).
If the Active=Saved option is not enabled in any FICON-enabled VSAN in the fabric, then
FICON-specific configuration changes are not saved in the IPL file and an implicit copy running
startup command is not issued, you must explicitly save the running configuration to the startup
configuration (see number 3 in Table 36-2).
FICON- Implicitcopy
enabled active equals saved running start
Number VSAN? Enabled? Issued? Notes
1 Yes Yes (in all FICON Implicit FICON changes written to the IPL file.
VSANs)
Non-FICON changes saved to startup configuration and
persistent storage.
2 Yes Yes (even in one Implicit FICON changes written to IPL file for only the VSAN that
FICON VSAN) has active equals saved option enabled.
Non-FICON changes saved to startup configuration and
persistent storage.
3 Yes Not in any FICON Not implicit FICON changes are not written to the IPL file.
VSAN
Non-FICON changes are saved in persistent storageonly
if you explicitly issue the copy running start command.
4 No Not applicable
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If a port is shut down, unblocking that port does not initialize the port.
Note The shutdown/no shutdown port state is independent of the block/no block port state.
To block or unblock port addresses in a VSAN using Device Manager, follow these steps:
Step 3 Check the Blocked check box for the port that you want to block.
Step 4 Click Apply to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Check the ESCON Style check box to see the available and prohibited ESCON style ports.
In Figure 36-15, A stands for available and P stands for prohibited.
When the port address is highlighted red, it represents the E/TE port or multiple interfaces.
Port Prohibiting
To prevent implemented ports from talking to each other, configure prohibits between two or more ports.
If you prohibit ports, the specified ports are prevented from communicating with each other.
Unimplemented ports are always prohibited. In addition, prohibit configurations are always
symmetrically appliedif you prohibit port 0 from talking to port 15, port 15 is automatically prohibited
from talking to port 0.
Note If an interface is already configured in E or TE mode and you try to prohibit that port, your prohibit
configuration is rejected. Similarly, if a port is not up and you prohibit that port, the port is not allowed
to come up in E mode or in TE mode.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note To view the latest FICON information, you must click the Refresh button. See the Automatically
Saving the Running Configuration section on page 36-23.
About RLIR
The Registered Link Incident Report (RLIR) application provides a method for a switch port to send an
Link Incident Record (LIR) to a registered Nx port. It is a highly available application.
When an LIR is detected in FICON-enabled switches in the Cisco MDS 9000 Family from a RLIR
Extended Link Service (ELS), the switch sends that record to the members in its Established Registration
List (ERL).
In case of multi-switch topology, a Distribute Registered Link Incident Record (DRLIR) Inter-Link
Service (ILS) is sent to all reachable remote domains along with the RLIR ELS. On receiving the DRLIR
ILS, the switch extracts the RLIR ELS and sends it to the members of the ERL.
The Nx ports interested in receiving the RLIR ELS send the Link Incident Record Registration (LIRR)
ELS request to the management server on the switch. The RLIRs are processed on a per-VSAN basis.
The RLIR data is written to persistent storage when you copy the running configuration to the startup
configuration.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Multiple FICON configuration files with the same name can exist in the same switch, provided they
reside in different VSANs. For example, you can create a configuration file named XYZ in both VSAN
1 and VSAN 3.
When you enable the FICON feature in a VSAN, the switches always use the startup FICON
configuration file, called IPL. This file is created with a default configuration as soon as FICON is
enabled in a VSAN.
Caution When FICON is disabled on a VSAN, all the FICON configuration files are irretrievably lost.
FICON configuration files contain the following configuration for each implemented port address:
Block
Prohibit mask
Port address name
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Normal configuration files used by Cisco MDS switches include FICON-enabled attributes for a VSAN,
port number mapping for PortChannels and FCIP interfaces, port number to port address mapping, port
and trunk allowed VSAN configuration for ports, in-order guarantee, static domain ID configuration, and
fabric binding configuration.
See the Chapter 12, Initial Configuration, for details on the normal configuration files used by Cisco
MDS switches.
This section includes the following topics:
About FICON Configuration Files, page 36-29
Applying the Saved Configuration Files to the Running Configuration, page 36-29
Editing FICON Configuration Files, page 36-30
Displaying FICON Configuration Files, page 36-30
Copying FICON Configuration Files, page 36-31
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Highlight the file you want to apply and click Apply File to apply the configuration to the running
configuration.
Note To view the latest FICON information, you must click the Refresh button. See the Automatically
Saving the Running Configuration section on page 36-23.
To edit the contents of a specified FICON configuration file using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 36-18 Create FICON VSANs Files Dialog Box in Device Manager
Port Swapping
The FICON port-swapping feature is only provided for maintenance purposes.
The FICON port-swapping feature causes all configurations associated with old-port-number and new
port-number to be swapped, including VSAN configurations.
Cisco MDS switches allow port swapping for nonexistent ports as follows:
Only FICON-specific configurations (prohibit, block, and port address mapping) are swapped.
No other system configuration is swapped.
All other system configurations are only maintained for existing ports.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If you swap a port in a module that has unlimited oversubscription ratios enabled with a port in a
module that has limited oversubscription ratios, then you may experience a degradation in
bandwidth.
Tip If you check the Active=Saved check box on any FICON VSAN, then the swapped configuration is
automatically saved to startup. Otherwise, you must explicitly save the running configuration
immediately after swapping the ports.
Once you swap ports, the switch automatically performs the following actions:
Shuts down both the old and new ports.
Swaps the port configuration.
If you attempt to bring the port up, you must explicitly shut down the port to resume traffic.
Note To view the latest FICON information, you must click the Refresh button. See the Automatically
Saving the Running Configuration section on page 36-23.
Note The 32-port module guidelines also apply for port swapping configurations .
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Swapping Ports
To swap ports using Device Manager, follow these steps:
Step 1 Select two Fibre Channel ports by holding down the CTRL key and clicking them.
Step 2 Choose FICON > Swap Selected Ports (see Figure 36-19).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
144880
IBM Cisco MDS Cisco MDS Tape library
OS/390
Figure 36-21 Host Accessing Standalone IBM-VTS (Virtual Tape Server) /STK-VSM (Virtual Shared
Memory)
144881
VSM Cisco MDS Tape library
4 VTCs
Master + I/O
OS/390 VTC VTS 0 Distribution library
VTC 349x
VTC Tape Lib
< 14m
VTC
FICON FICON
Over FCIP Over FCIP
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
OS/390 VTSS
349x
Tape Lib
VTCS
FICON FICON
Over FCIP Over FCIP
349x
Tape Lib
144883
VTSS
Note For information about FCIP tape acceleration, see FCIP Tape Acceleration section on page 48-32.
Step 1 Expand ISL and then select FCIP in the Physical Attributes pane.
Step 2 Click the Tunnels tab in the Information pane.
You see a list of available switches (Figure 36-24).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Configure the tunnel with the options shown in Figure 36-25.
Step 5 Check the TapeAccelerator check box to enable FICON tape acceleration over this FCIP tunnel.
Step 6 Click Create.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CUP is supported by switches and directors in the Cisco MDS 9000 Family. The CUP function allows
the mainframe to manage the Cisco MDS switches.
Host communication includes control functions such as blocking and unblocking ports, as well as
monitoring and error reporting functions.
Step 1 In Fabric Manager, choose Zone > Edit Full Zoneset, and then choose Edit > Edit Default Zone
Attributes to set the default zone to permit for the required VSAN. (See Figure 36-26.)
Step 2 In Device Manager, choose FC > Name Server... for the required VSAN and obtain the FICON:CUP
WWN. See Figure 36-27.
Note If more than one FICON:CUP WWN exists in this fabric, be sure to add all the FICON:CUP pWWNs
to the required zone.
Step 3 In Fabric Manager, choose Zone > Edit Full Zoneset and add the FICON:CUP pWWN to the zone
database. (See Figure 36-28.)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Tools > Other > Flow Load Balance Calculator.
You see the Flow Load Balance Calculator (see Figure 36-29).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you change flows or ISLs, you must click Calculate to see the new recommendation.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To display FICON port address information using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The director history buffer provides a mechanism to determine the change in the port state from the
previous time when a value was contained in the key counter.
To view the directory history buffer using Device Manager, follow these steps:
Default Settings
Table 36-3 lists the default settings for FICON features.
Parameters Default
FICON feature Disabled.
Port numbers Same as port addresses.
FC ID last byte value 0 (zero).
EBCDIC format option US-Canada.
Switch offline state Hosts are allowed to move the switch to an offline state.
Mainframe users Allowed to configure FICON parameters on Cisco MDS
switches.
Clock in each VSAN Same as the switch hardware clock.
Host clock control Allows host to set the clock on this switch.
SNMP users Configure FICON parameters.
Port address Not blocked.
Prohibited ports Ports 90253 and 255 for the Cisco MDS 9200 Series
switches.
Ports 250253 and 255 for the Cisco MDS 9500 Series
switches.
CH A P T E R 37
Advanced Features and Concepts
This chapter describes the advanced features provided in switches in the Cisco MDS 9000 Family. It
includes the following sections:
Common Information Model, page 37-1
Fibre Channel Time Out Values, page 37-2
World Wide Names, page 37-5
FC ID Allocation for HBAs, page 37-7
Switch Interoperability, page 37-8
Default Settings, page 37-13
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The certificate file contains the certificate and the private key.
The private key must be RSA type.
The certificate file should be in PEM (Private Electronic Mail) style format and have .pem as the
extension.
-----BEGIN CERTIFICATE-----
(certificate goes here)
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----
(private key goes here)
-----END RSA PRIVATE KEY-----
Caution The D_S_TOV, E_D_TOV, and R_A_ TOV values cannot be globally changed unless all VSANs in the
switch are suspended.
Note If a VSAN is not specified when you change the timer value, the changed value is applied to all VSANs
in the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To configure timers in Fabric Manager, expand Switches > FC Services and then select Timers &
Policies in the Physical Attributes pane. You see the timers for multiple switches in the Information
pane. Click the Change Timeouts button to configure the timeout values.
You see the dialog box as shown in Figure 37-1.
To configure timers in Device Manager, click FC > Advanced > Timers/Policies. You see the timers for
a single switch in the dialog box as shown in Figure 37-2.
Caution You cannot perform a nondisruptive downgrade to any earlier version that does not support per-VSAN
FC timers.
Note This configuration must be propagated to all switches in the fabricbe sure to configure the same value
in all switches in the fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If a switch is downgraded to Cisco MDS SAN-OS Release 1.2 or 1.1 after the timer is configured for a
VSAN, an error message is issued to warn against strict incompatibilities. the Cisco MDS 9000 Family
Troubleshooting Guide.
To configure per-VSAN Fiber Channel timers using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
When you commit the fctimer configuration changes, the effective database is overwritten by the
configuration changes in the pending database and all the switches in the fabric receive the same
configuration. When you commit the fctimer configuration changes without implementing the session
feature, the fctimer configurations are distributed to all the switches in the physical fabric.
Note The number of pending fctimer configuration operations cannot be more than 15. At that point, you must
commit or abort the pending configurations before performing any more operations.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Changes to the world-wide names should be made by an administrator or individual who is completely
familiar with switch operations.
Note As of Cisco SAN-OS Release 2.0(2b), the ELP is enhanced to be compliant with FC-SW-3.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Persistent entries take precedence over company ID configuration. If the HBA fails to discover
a target, verify that the HBA and the target are connected to the same switch and have the same
area in their FC IDs, then perform the following procedure:
Tip We recommend that you set the fcinterop FC ID allocation scheme to auto and use the company
ID list and persistent FC ID configuration to manipulate the FC ID device allocation.
Refer to the Cisco MDS 9000 Family CLI Configuration Guide to change the FC ID allocation.
Switch Interoperability
Interoperability enables the products of multiple vendors to come into contact with each other. Fibre
Channel standards guide vendors towards common external Fibre Channel interfaces.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If all vendors followed the standards in the same manner, then interconnecting different products would
become a trivial exercise. However, not all vendors follow the standards in the same way, thus resulting
in interoperability modes. This section briefly explains the basic concepts of these modes.
Each vendor has a regular mode and an equivalent interoperability mode, which specifically turns off
advanced or proprietary features and provides the product with a more amiable standards compliant
implementation.
This section includes the following topics:
About Interop Mode, page 37-9
Configuring Interop Mode 1, page 37-11
Verifying Interoperating Status, page 37-12
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Brocades msplmgmtdeactivate command must explicitly be run prior to connecting from a Brocade
switch to either Cisco MDS 9000 Family switches or to McData switches. This command uses Brocade
proprietary frames to exchange platform information, which Cisco MDS 9000 Family switches or
McData switches do not understand. Rejecting these frames causes the common E ports to become
isolated.
To configure interop mode 1 for a VSAN using Fabric Manager, follow these steps:
Step 1 Choose VSANxxx > VSAN Attributes from the Logical Domains pane.
Step 2 Select Interop-1 from the Interop drop-down menu.
Step 3 Click Apply Changes to save this interop mode.
Step 4 Expand VSANxxx and then select Domain Manager from the Logical Domains pane.
You see the Domain Manager configuration in the Information pane as shown in Figure 37-5.
Step 5 Set the Domain ID in the range of 97 (0x61) through 127 (0x7F).
a. Click the Configuration tab.
b. Click in the Configure Domain ID column under the Configuration tab.
c. Click the Running tab and check that the change has been made.
Note When changing the domain ID, the FC IDs assigned to N ports also change.
Step 6 Change the Fibre Channel timers (if they have been changed from the system defaults).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The Cisco MDS 9000, Brocade, and McData FC error detect (ED_TOV) and resource allocation
(RA_TOV) timers default to the same values. They can be changed if needed. The RA_TOV
default is 10 seconds, and the ED_TOV default is 2 seconds. Per the FC-SW2 standard, these
values must be the same on each switch within the fabric.
a. Expand Switches > FC Services and then select Timers and Policies. You see the timer settings in
the Information pane.
b. Click Change Timeouts to modify the time-out values.
c. Click Apply to save the new time-out values.
Step 7 (Optional) Choose VSANxxx > Domain Manager> Configuration tab and select disruptive or
nonDisruptive in the Restart column to restart the domain.
Step 1 Choose Switches in the Physical Attributes pane and check the release number in the Information pane
to verify the Cisco NX-OS release.
Step 2 Expand Switches > Interfaces and then select FC Physical to verify the interface modes for each
switch.
Step 3 Expand Fabricxx in the Logical Domains pane and then select All VSANs to verify the interop mode
for all VSANs.
Step 4 Expand Fabricxx > All VSANs and then select Domain Manager to verify the domain IDs, local, and
principal sWWNs for all VSANs (see Figure 37-6).
Step 5 Using Device Manager, choose FC > Name Server to verify the name server information.
You see the Name Server dialog box as shown in Figure 37-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The Cisco MDS name server shows both local and remote entries, and does not time out the entries.
Default Settings
Table 37-3lists the default settings for the features included in this chapter.
Parameters Default
CIM server Disabled
CIM server security protocol HTTP
D_S_TOV 5,000 milliseconds.
E_D_TOV 2,000 milliseconds.
R_A_TOV 10,000 milliseconds.
Timeout period to invoke fctrace 5 seconds.
Number of frame sent by the fcping feature 5 frames.
Remote capture connection protocol TCP.
Remote capture connection mode Passive.
Local capture frame limit s 10 frames.
FC ID allocation mode Auto mode.
Loop monitoring Disabled.
D_S_TOV 5,000 msec
E_D_TOV 2,000 msec
R_A_TOV 10,000 msec
Interop mode Disabled
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PA R T 5
Security
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 38
Configuring FIPS
The Federal Information Processing Standards (FIPS) Publication 140-2, Security Requirements for
Cryptographic Modules, details the U.S. government requirements for cryptographic modules. FIPS
140-2 specifies that a cryptographic module should be a set of hardware, software, firmware, or some
combination that implements cryptographic functions or processes, including cryptographic algorithms
and, optionally, key generation, and is contained within a defined cryptographic boundary.
FIPS specifies certain crypto algorithms as secure, and it also identifies which algorithms should be used
if a cryptographic module is to be called FIPS compliant.
Note Cisco MDS SAN-OS Release 3.1(1) and NX-OS Release 4.1(1b) or later implements FIPS features and
is currently in the certification process with the U.S. government, but it is not FIPS compliant at this
time.
Configuration Guidelines
Follow these guidelines before enabling FIPS mode:
Make your passwords a minimum of eight characters in length.
Disable Telnet. Users should log in using SSH only.
Disable remote authentication through RADIUS/TACACS+. Only users local to the switch can be
authenticated.
Disable SNMP v1 and v2. Any existing user accounts on the switch that have been configured for
SNMPv3 should be configured only with SHA for authentication and AES/3DES for privacy.
Disable VRRP.
Delete all IKE policies that either have MD5 for authentication or DES for encryption. Modify the
policies so they use SHA for authentication and 3DES/AES for encryption.
Delete all SSH Server RSA1 key-pairs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches from the Physical Attributes pane. Expand Security and then select FIPS.
You see the FIPS activation details in the Information pane as shown in Figure 38-1.
Step 2 Check the ModeActivation check box next to the switch for which you want to enable FIPS mode.
Step 3 Click Apply Changes to commit and distribute these changes.
Step 4 Click Undo Changes to discard any unsaved changes.
Step 2 Check the FIPSModeActivation check box to enable FIPS mode on the selected switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FIPS Self-Tests
A cryptographic module must perform power-up self-tests and conditional self-tests to ensure that it is
functional.
Note FIPS power-up self-tests automatically run when FIPS mode is enabled . A switch is in FIPS mode only
after all self-tests are successfully completed. If any of the self-tests fail, then the switch is rebooted.
Power-up self-tests run immediately after FIPS mode is enabled. A cryptographic algorithm test using a
known answer must be run for all cryptographic functions for each FIPS 140-2-approved cryptographic
algorithm implemented on the Cisco MDS 9000 Family.
Using a known-answer test (KAT), a cryptographic algorithm is run on data for which the correct output
is already known, and then the calculated output is compared to the previously generated output. If the
calculated output does not equal the known answer, the known-answer test fails.
Conditional self-tests must be run when an applicable security function or operation is invoked. Unlike
the power-up self-tests, conditional self-tests are executed each time their associated function is
accessed.
Conditional self-tests include the following:
Pair-wise consistency testThis test is run when a public-private key-pair is generated.
Continuous random number generator testThis test is run when a random number is generated.
Both of these tests automatically run when a switch is in FIPS mode.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 39
Configuring Users and Common Roles
The CLI and SNMP use common roles in all switches in the Cisco MDS 9000 Family. You can use the
CLI to modify a role that was created using SNMP and vice versa.
Users, passwords, and roles for all CLI and SNMP users are the same. A user configured through the
CLI can access the switch using SNMP (for example, the Fabric Manager or the Device Manager) and
vice versa.
This chapter includes the following sections:
Role-Based Authorization, page 39-1
Role Distributions, page 39-7
User Accounts, page 39-10
SSH Services, page 39-15
Recovering the Administrator Password, page 39-20
Configuring Cisco ACS Servers, page 39-21
Default Settings, page 39-24
Role-Based Authorization
Switches in the Cisco MDS 9000 Family perform authentication based on roles. Role-based
authorization limits access to switch operations by assigning users to roles. This kind of authentication
restricts you to management operations based on the roles to which you have been added.
When you execute a command, perform command completion, or obtain context sensitive help, the
switch software allows the operation to progress if you have permission to access that command.
This section includes the following topics:
About Roles, page 39-2
Configuring Roles and Profiles, page 39-2
Deleting Common Roles, page 39-3
About the VSAN Policy, page 39-3
Modifying the VSAN Policy, page 39-4
About Rules and Features for Each Role, page 39-4
Modifying Rules, page 39-5
Displaying Role-Based Information, page 39-7
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
About Roles
Each role can contain multiple users and each user can be part of multiple roles. For example, if role1
users are only allowed access to configuration commands, and role2 users are only allowed access to
debug commands, then if Joe belongs to both role1 and role2, he can access configuration as well as
debug commands.
Note If you belong to multiple roles, you can execute a union of all the commands permitted by these roles.
Access to a command takes priority over being denied access to a command. For example, suppose you
belong to a TechDocs group and you were denied access to configuration commands. However, you also
belong to the engineering group and have access to configuration commands. In this case, you will have
access to configuration commands.
Tip Any role, when created, does not allow access to the required commands immediately. The administrator
must configure appropriate rules for each role to allow access to the required commands.
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane. Click
the Roles tab in the Information pane.
You see the information as shown in Figure 39-1
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Device Manager automatically creates six roles that are required for Device Manager to display a view
of a switch. These roles are system, snmp, module, interface, hardware, and environment.
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane. Click
the Roles tab in the Information pane.
Step 2 Click the role you want to delete.
Step 3 Click Delete Row to delete the common role.
Step 4 Click Yes to confirm the deletion or No to cancel it.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You can configure a role so that it only allows tasks to be performed for a selected set of VSANs. By
default, the VSAN policy for any role is permit, which allows tasks to be performed for all VSANs. You
can configure a role that only allows tasks to be performed for a selected set of VSANs. To selectively
allow VSANs for a role, set the VSAN policy to deny, and then set the configuration to permit or the
appropriate VSANs.
Note Users configured in roles where the VSAN policy is set to deny cannot modify the configuration for E
ports. They can only modify the configuration for F or FL ports (depending on whether the configured
rules allow such configuration to be made). This is to prevent such users from modifying configurations
that may impact the core topology of the fabric.
Tip Roles can be used to create VSAN administrators. Depending on the configured rules, these VSAN
administrators can configure MDS features (for example, zone, fcdomain, or VSAN properties) for their
VSANs without affecting other VSANs. Also, if the role permits operations in multiple VSANs, then the
VSAN administrators can change VSAN membership of F or FL ports among these VSANs.
Users belonging to roles in which the VSAN policy is set to deny are referred to as VSAN-restricted
users.
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane. Click
the Roles tab in the Information pane.
Step 2 Check the Scope Enable check box if you want to enable the VSAN scope and restrict this role to a
subset of VSANs.
Step 3 Enter the list of VSANs in the Scope VSAN Id List field that you want to restrict this role to.
Step 4 Click Apply Changes to save these changes or click Undo Changes to discard any unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note In this case, exec CLI commands refer to all commands in the EXEC mode that do not fall in the show,
debug, and clear CLI command categories.
Modifying Rules
To modify the rules for an existing role using Device Manager, follow these steps:
Step 3 Click the role for which you want to edit the rules.
Step 4 Click Rules to view the rules for the role.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see the Rules dialog box shown in Figure 39-4. It may take a few minutes to display.
Step 5 Edit the rules you want to enable or disable for the common role.
Step 6 Click Apply to apply the new rules and close the Rules dialog box, or click Close to close the Rules
dialog box without applying the rules.
Rule 1 is applied first, thus permitting, for example, sangroup users access to all config CLI commands.
Rule 2 is applied next, denying FSPF configuration to sangroup users. As a result, sangroup users can
perform all other config CLI commands, except fspf CLI configuration commands.
Note The order of rule placement is important. If you had swapped these two rules and issued the deny config
feature fspf rule first and issued the permit config rule next, you would be allowing all sangroup users
to perform all configuration commands because the second rule globally overrode the first rule.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Role Distributions
Role-based configurations use the Cisco Fabric Services (CFS) infrastructure to enable efficient
database management, and to provide a single point of configuration for the entire fabric (see
Chapter 13, Using the CFS Infrastructure).
The following configurations are distributed:
Role names and descriptions
List of rules for the roles
VSAN policy and the list of permitted VSANs
This section includes the following topics:
About Role Databases, page 39-7
Locking the Fabric, page 39-8
Committing the Changes, page 39-8
Discarding the Changes, page 39-9
Enabling Distribution, page 39-9
Clearing Sessions, page 39-9
Database Merge Guidelines, page 39-10
Displaying Roles When Distribution is Enabled, page 39-10
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select Users and Roles in the Physical Attributes pane. Click the
Roles CFS tab in the Information pane.
You see the screen shown in Figure 39-5.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select Users and Roles in the Physical Attributes pane. Click the
Roles CFS tab in the Information pane.
Step 2 Set the Config Action drop-down menu to abort to discard any uncommitted changes.
Step 3 Click Apply Changes to save this change.
Enabling Distribution
To enable role-based configuration distribution using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select Users and Roles in the Physical Attributes pane. Click the
Roles CFS tab in the Information pane.
Step 2 Set the Global drop-down menu to enable to enable CFS distribution.
Step 3 Click Apply Changes to save this change.
Clearing Sessions
To forcibly clear the existing role session in the fabric using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select Users and Roles in the Physical Attributes pane. Click the
Roles CFS tab in the Information pane.
Step 2 Set the Config Action drop-down menu to clear to clear the pending database.
Step 3 Click Apply Changes to save this change.
Note Any changes in the pending database are lost when you clear a session.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select Users and Roles in the Physical Attributes pane. Click the
Roles CFS tab in the Information pane (see Figure 39-6).
Step 2 Set the Config View As drop-down value to pending to view the pending database or set the Config View
drop-down menu to running to view the running database.
Step 3 Click Apply Changes to save this change.
User Accounts
Every Cisco MDS 9000 Family switch user has the account information stored by the system. Your
authentication information, user name, user password, password expiration date, and role membership
are stored in your user profile.
The tasks explained in this section enable you to create users and modify the profile of an existing user.
These tasks are restricted to privileged users as determined by your administrator.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The password should have the strong characteristics, such as the following:
Are at least eight characters long
Not contain many consecutive characters (such as abcd)
Not contain many repeating characters (such as aaabbb)
Not contain dictionary words
Contain both upper- and lowercase characters
Contain numbers
The following are examples of strong passwords:
If2CoM18
2004AsdfLkj30
Cb1955S21
Note Clear test passwords can only contain alphanumeric characters. Special characters such as the dollar sign
($) or the percent sign (%) are not allowed.
About Users
The passphrase specified in the snmp-server user option and the password specified username option
are synchronized (see the SNMPv3 CLI User Management and AAA Integration section on
page 40-2).
By default, the user account does not expire unless you explicitly configure it to expire. The expire
option determines the date on which the user account is disabled. The date is specified in the
YYYY-MM-DD format.
Tip The following words are reserved and cannot be used to configure users: bin, daemon, adm, lp, sync,
shutdown, halt, mail, news, uucp, operator, games, gopher, ftp, nobody, nscd, mailnull, rpc, rpcuser, xfs,
gdm, mtsuser, ftpuser, man, and sys.
Note User passwords are not displayed in the switch configuration file.
Tip If a password is trivial (short, easy-to-decipher), your password configuration is rejected. Be sure to
configure a strong password as shown in the sample configuration. Passwords are case-sensitive.
admin is no longer the default password for any Cisco MDS 9000 Family switch. You must explicitly
configure a strong password.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Cisco MDS SAN-OS does not support all numeric user names, whether created with TACACS+ or
RADIUS, or created locally. Local users with all numeric names cannot be created. If an all numeric user
name exists on an AAA server and is entered during login, the user is not logged in.
Configuring Users
To configure a new user or to modify the profile of an existing user using Fabric Manager, follow these
steps:
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane. Click
the Users tab in the Information pane to see a list of users like the one in Figure 39-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see the Create Users dialog box shown in Figure 39-8.
Step 3 (Optional) alter the Switches check boxes to specify one or more switches.
Step 4 Enter the user name in the New User field.
Step 5 Select a role from the Role drop-down menu. You can also enter a new role name in the field if you do
not want to select one from the drop-down menu. If you do this, go back and configure this role
appropriately (see the User Accounts section on page 39-10).
Step 6 Enter the password for the user in the New Password and Confirm Password fields. Enter the same new
password in the New Password and Confirm Password fields.
Step 7 Check the Privacy check box and complete the password fields to encrypt management traffic.
Step 8 Click Create to create the entry or click Close to discard any unsaved changes and close the dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note New password will be saved after the fabric is open. The user name and password fields are
editable in the Fabric tab only after you unmanage fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Deleting a User
To delete a user using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane. Click
the Users tab in the Information pane to see a list of users.
Step 2 Click the name of the user you want to delete.
Step 3 Click Delete Row to delete the selected user.
Step 4 Click Apply Changes to save this change.
Step 1 Expand Security and then select Users and Roles in the Physical Attributes pane.
Step 2 Click the Users tab. You see the list of SNMP users shown in Figure 39-9 in the Information pane.
SSH Services
The Telnet service is enabled by default on all Cisco MDS 9000 Family switches. Before enabling the
SSH service, generate a server key pair (see the Generating the SSH Server Key Pair section on
page 39-17).
This section includes the following topics:
About SSH, page 39-16
About the SSH Server Key Pair, page 39-16
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
About SSH
SSH provides secure communications to the Cisco NX-OS CLI. You can use SSH keys for the following
SSH options:
SSH1
SSH2, using RSA
SSH2 using DSA
Caution If you delete all of the SSH keys, you cannot start a new SSH session.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select SSH and Telnet.
You see the configuration shown in Figure 39-10 in the Information pane.
Step 3 Check the switches you want to assign to this SSH key pair.
Step 4 Choose the key pair option type from the listed Protocols. The listed protocols are SSH1, SSH2(rsa), and
SSH2(dsa).
Step 5 Set the number of bits that will be used to generate the key pairs in the NumBits drop-down menu.
Step 6 Click Create to generate these keys or click Close to discard any unsaved changes.
Note 1856 DSA NumberKeys are not supported by switches that running Cisco MDS NX-OS software
version 4.1(1) and later.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select SSH and Telnet.
You see the configuration in the Information pane.
Step 2 Highlight the key that you want to overwrite and click Delete Row.
Step 3 Click Apply Changes to save these changes or click the Undo Changes to discard unsaved changes.
Step 4 Click the Create Row.
You see the SSH and Telnet Key Create dialog box.
Step 5 Check the switches you want to assign this SSH key pair.
Step 6 Choose the key pair option type from the Protocols radio buttons.
Step 7 Set the number of bits that will be used to generate the key pairs in the NumBits drop-down menu.
Step 8 Click Create to generate these keys or click Close to discard any unsaved changes.
Step 1 Expand Switches > Security and then select SSH and Telnet.
Step 2 Select the Control tab and check an SSH check box or Telnet check box for each switch as shown in
Figure 39-12.
Step 3 Click Apply Changes to save this change or click Undo Changes to discard unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you are logging in to a switch through SSH and you have issued the aaa authentication login
default none CLI command, you must enter one or more key strokes to log in. If you press the
Enter key without entering at least one keystroke, your log in will be rejected.
Tip The following words are reserved and cannot be used to configure users: bin, daemon, adm, lp, sync,
shutdown, halt, mail, news, uucp, operator, games, gopher, ftp, nobody, nscd, mailnull, rpc, rpcuser, xfs,
gdm, mtsuser, ftpuser, man, and sys.
Note User passwords are not displayed in the switch configuration file.
Tip If a password is trivial (short, easy-to-decipher), your password configuration is rejected. Be sure to
configure a strong password as shown in the sample configuration. Passwords are case-sensitive.
admin is no longer the default password for any Cisco MDS 9000 Family switch. You must explicitly
configure a strong password.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Cisco MDS NX-OS does not support all numeric usernames, whether created with TACACS+ or
RADIUS, or created locally. Local users with all numeric names cannot be created. If an all numeric
username exists on an AAA server and is entered during login, the user is not logged in.
Tip To issue commands with the internal keyword for troubleshooting purposes, you must have an account
that is a member of the network-admin group.
Note Only the network-admin users are allowed to modify other user's privileges.
To configure a new user or to modify the profile of an existing user using Fabric Manager, follow these
steps:
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane. Click
the Users tab in the Information pane to see the user information.
Step 2 Click Create Row to create a user.
You see the Create Users dialog box.
Step 3 Select the switches to which this user will be allowed access.
Step 4 Assign a new user name and password.
Step 5 Select the roles that you want to assign to this new user.
Step 6 Select the digest and encryption for the user that you are creating or updating.
Step 7 (Optional) enter an expiry date and an SSH file name for the user.
Step 8 Click Create to create the user or Close to discard the changes.
Note To recover an administrators password, refer to the Cisco MDS 9000 Family CLI Configuration Guide.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Cisco MDS NX-OS does not support all numeric usernames, whether created with TACACS+ or
RADIUS, or created locally. Local users with all numeric names cannot be created. If an all numeric user
name exists on an AAA server and is entered during login, the user is not logged in.
Note Each role specified in the cisco-av-pair must exist in the MDS, or the user will have the network-operator
role.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 39-14 Configuring Multiple Roles with SNMPv3 Attributes When Using RADIUS
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 39-15 Configuring the network-admin Role with SNMPv3 Attributes When Using TACACS+
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 39-16 Configuring Multiple Roles with SNMPv3 Attributes When Using TACACS+
Default Settings
Table 39-1 lists the default settings for all switch security features in any switch.
Parameters Default
Roles in Cisco MDS Switches Network operator (network-operator).
AAA configuration services Local.
Authentication port 1812.
Accounting port 1813.
Preshared key communication Clear text.
RADIUS server time out 1 (one) second.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
RADIUS server retries Once.
TACACS+ Disabled.
TACACS+ servers None configured.
TACACS+ server timeout 5 seconds.
AAA server distribution Disabled.
VSAN policy for roles Permit.
User account No expiry (unless configured).
Password None.
Accounting log size 250 KB.
SSH service Disabled.
Telnet service Enabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 40
Configuring SNMP
The CLI and SNMP use common roles in all switches in the Cisco MDS 9000 Family. You can use
SNMP to modify a role that was created using the CLI and vice versa.
Users, passwords, and roles for all CLI and SNMP users are the same. A user configured through the
CLI can access the switch using SNMP (for example, the Fabric Manager or the Device Manager) and
vice versa.
This chapter includes the following sections:
About SNMP Security, page 40-1
SNMPv3 CLI User Management and AAA Integration, page 40-2
Creating and Modifying Users, page 40-4
SNMP Trap and Inform Notifications, page 40-8
Default Settings, page 40-12
SNMP v1 or v2c
(network operator level)
Switch 1
SNMP request
GET or SET
SNMP response SNMP commands
(response depends on successful authentication)
85473
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
SNMP Version 3
SNMP Version 3 (SNMPv3) is an interoperable standards-based protocol for network management.
SNMPv3 provides secure access to devices by a combination of authenticating and encrypting frames
over the network. The security features provided in SNMPv3 are:
Message integrityEnsures that a packet has not been tampered with in-transit.
AuthenticationDetermines the message is from a valid source.
EncryptionScrambles the packet contents to prevent it from being seen by unauthorized sources.
SNMPv3 provides for both security models and security levels. A security model is an authentication
strategy that is set up for a user and the role in which the user resides. A security level is the permitted
level of security within a security model. A combination of a security model and a security level
determines which security mechanism is employed when handling an SNMP packet.
Step 1 Expand Switches from the Physical Attributes pane. You see the switch settings in the Information pane.
Step 2 Fill in the Location and Contact fields for each switch.
Step 3 Click Apply Changes to save these changes or click Undo Changes to discard any unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
SNMPv3 user management can be centralized at the AAA server level. This centralized user
management allows the SNMP agent running on the Cisco MDS switch to leverage the user
authentication service of the AAA server. Once user authentication is verified, the SNMP PDUs are
processed further. Additionally, the AAA server is also used to store user group names. SNMP uses the
group names to apply the access/role policy that is locally available in the switch.
This section includes the following topics:
CLI and SNMP User Synchronization, page 40-3
Restricting Switch Access, page 40-3
Group-Based SNMP Access, page 40-3
Note When the passphrase/password is specified in localized key/encrypted format, the password is
not synchronized.
Note Starting in 3.0(1), the temporary SNMP login created for FM is no longer 24 hours. It is one
hour.
Existing SNMP users continue to retain the auth and priv passphrases without any changes.
If the management station creates an SNMP user in the usmUserTable, the corresponding CLI user
is created without any password (login is disabled) and will have the network-operator role.
Note Because group is a standard SNMP term used industry-wide, we refer to role(s) as group(s) in this SNMP
section.
SNMP access rights are organized by groups. Each group in SNMP is similar to a role through the CLI.
Each group is defined with three accesses: read access, write access, and notification access. Each access
can be enabled or disabled within each group.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You can begin communicating with the agent once your user name is created, your roles are set up by
your administrator, and you are added to the roles.
Tip All updates to the CLI security database and the SNMP user database are synchronized. You can use the
SNMP password to log into either Fabric Manager or Device Manager. However, after you use the CLI
password to log into Fabric Manager or Device Manager, you must use the CLI password for all future
logins. If a user exists in both the SNMP database and the CLI database before upgrading to Cisco MDS
SAN-OS Release 2.0(1b), then the set of roles assigned to the user becomes the union of both sets of
roles after the upgrade.
Note For an SNMPv3 operation using the external AAA server, user configurations in the external AAA server
require AES to be the privacy protocol to use SNMP PDU encryption.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane.
Step 2 Click the Users tab in the Information pane to see a list of users like the one shown in Figure 40-2.
Step 8 Check the Enforce SNMP Privacy Encryption check box to encrypt management traffic.
Step 9 Click Create to create the new entry.
To enforce the SNMPv3 message encryption globally on all the users using Fabric Manager, follow these
steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Select a VSAN in the Logical Domains pane. This will not work if you select All VSANS.
Step 2 Expand Switches > Security and then select Users and Roles in the Physical Attributes pane. Click the
Global tab in the Information pane.
Step 3 Check the GlobalEnforcePriv check box.
Step 4 Click the Apply Changes icon to save these changes.
Note Only users belonging to a network-admin role can assign roles to other users.
To add multiple roles to a new user using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane.
Step 2 Click the Users tab in the Information pane to see a list of users like the one in Figure 40-2.
Step 3 Click Create Row.
You see the Create Users dialog box shown in Figure 40-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 (Optional) Provide an expiration date for the user and the file name of an SSH key.
Step 7 Click Create to create the new roles.
Adding Communities
You can configure read-only or read-write access for SNMPv1 and SNMPv2 users. Refer to RFC 2576.
To create an SNMPv1 or SNMPv2c community string using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane.
Step 2 Click the Communities tab in the Information pane.
You see the existing communities (see Figure 40-5).
Note You can enter a new role name in the field if you do not want to select one from the drop-down
list. If you do this, you must go back and configure this role appropriately (see the Role-Based
Authorization section on page 39-1).
Step 1 Expand Switches > Security and then select Users and Roles from the Physical Attributes pane.
Step 2 Click the Communities tab in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Use the SNMP-TARGET-MIB to obtain more information on the destinations to which notifications are
to be sent either as traps or as informs. Refer to the Cisco MDS 9000 Family MIB Quick Reference.
Step 1 Expand Switches > Events and then select SNMP Traps in the Physical Attributes pane.
You see the SNMP notification configuration in the Information pane shown in Figure 40-6.
Step 2 Click the Destinations tab to add or modify a receiver for SNMP notifications.
Step 3 Click Create Row to create a new notification destination.
You see the Create Destinations dialog box shown in Figure 40-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Check the switches for which you want to configure a new destination.
Step 5 Set the destination IP address and UDP port.
Step 6 Choose either the trap or inform radio button.
Step 7 (Optional) Set the timeout or retry count values.
Step 8 Click Create to add this destination to the selected switches.
Step 9 (Optional) Click the Other tab to enable specific notification types per switch.
Step 10 Click the Apply changes icon to create the entry.
Note Switches can forward events (SNMP traps and informs) up to 10 destinations.
Note To configure SNMPv3 notifications using IPv4 using Fabric Manager, select v3 from the Security
drop-down list in the Create Destinations dialog box (see Figure 40-7). Optionally, set the inform time
out and retry values. Click Create to add this destination to the selected switches.
Note In the case of SNMPv3 notifications, the SNMP manager is expected to know the user credentials
(authKey/PrivKey) based on the switchs engineID to authenticate and decrypt the SNMP messages.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 40-1 lists the Fabric Manager procedures that enable the notifications for Cisco MDS MIBs.
Choose Switches > Events > SNMP Traps to see the check boxes listed in this table.
Note Choosing Switches > Events > SNMP Traps enables both traps and informs, depending on how you
configured notifications. See notifications with the Configuring SNMPv3 Notifications section on
page 40-9 .
Step 1 Expand Switches > Events and then select SNMP Traps in the Physical Attributes pane.
You see the SNMP notification configuration in the Information pane.
Step 2 Click the FC tab to enable Fibre Channel related notifications.
Step 3 Check each notification check box that you want to enable.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The credentials of the notification target user are used for encrypting the SNMPv3 inform notification
messages to the configured SNMP .
Note For authenticating and decrypting the received INFORM PDU, the SNMP manager should have the same
user credentials in its local configuration data store of users.
Caution This is an advanced function that should only be used by administrators having experience with
SNMPv3.
SNMP events can be secured against interception or eavesdropping in the same way that SNMP
messages are secured. Fabric Manager or Device Manager allow you to configure the message
processing model, the security model, and the security level for the SNMP events that the switch
generates.
To configure SNMP event security using Fabric Manager, follow these steps:
Step 1 Expand Switches > Events and then select SNMP Traps.
Step 2 Click the Security tab in the Information pane.
You see the security information for SNMP notifications.
Step 3 Set the message protocol model (MPModel), security model, security name, and security level.
Step 4 Click the Apply Changes icon to save and apply your changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The MDS syslog manager must be set up before you can view the event logs.
Caution Changing these values from different Fabric Manager workstations at the same time may cause
unpredictable results.
Default Settings
Table 40-2 lists the default settings for all SNMP features in any switch.
Parameters Default
User account No expiry (unless configured).
Password None.
CH A P T E R 41
Configuring RADIUS and TACACS+
The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access
to, and tracks the actions of users managing a switch. All Cisco MDS 9000 Family switches use RADIUS
and TACACS+ protocols to provide solutions using remote AAA servers.
Based on the user ID and password combination provided, switches perform local authentication or
authorization using the local database or remote authentication or authorization using a AAA server. A
preshared secret key provides security for communication between the switch and AAA servers. This
secret key can be configured for all AAA servers or for only a specific AAA server. This security feature
provides a central management capability for AAA servers.
This chapter includes the following sections:
Switch Management Security, page 41-1
Switch AAA, page 41-2
Configuring RADIUS Server Monitoring Parameters, page 41-7
Configuring TACACS+ Server Monitoring Parameters, page 41-14
Server Groups, page 41-19
AAA Server Distribution, page 41-21
MSCHAP Authentication, page 41-24
Local AAA Services, page 41-26
Configuring Cisco Access Control Servers, page 41-26
Default Settings, page 41-30
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switch AAA
Using the CLI or Fabric Manager, you can configure AAA switch functionalities on any switch in the
Cisco MDS 9000 Family.
This section includes the following topics:
Authentication, page 41-3
Authorization, page 41-3
Accounting, page 41-3
Remote AAA Services, page 41-4
Remote Authentication Guidelines, page 41-4
Server Groups, page 41-4
AAA Configuration Options, page 41-4
Authentication and Authorization Process, page 41-6
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Authentication
Authentication is the process of verifying the identity of the person or device accessing the switch. This
identity verification is based on the user ID and password combination provided by the entity trying to
access the switch. Cisco MDS 9000 Family switches allow you to perform local authentication (using
the local lookup database) or remote authentication (using one or more RADIUS or TACACS+ servers).
Note When you log in to a Cisco MDS switch successfully using the Fabric Manager or Device Manager
through Telnet or SSH and if that switch is configured for AAA server-based authentication, a temporary
SNMP user entry is automatically created with an expiry time of one day. The switch authenticates the
SNMPv3 protocol data units (PDUs) with your Telnet or SSH login name as the SNMPv3 user. The
management station can temporarily use the Telnet or SSH login name as the SNMPv3 auth and priv
passphrase. This temporary SNMP login is only allowed if you have one or more active MDS shell
sessions. If you do not have an active session at any given time, your login is deleted and you will not
be allowed to perform SNMPv3 operations.
Note Fabric Manager does not support AAA passwords with trailing white space, for example passwordA.
Authorization
The following authorization roles exist in all Cisco MDS switches:
Network operator (network-operator)Has permission to view the configuration only. The operator
cannot make any configuration changes.
Network administrator (network-admin) Has permission to execute all commands and make
configuration changes. The administrator can also create and customize up to 64 additional roles.
Default-roleHas permission to use the GUI (Fabric Manager and Device Manager). This access is
automatically granted to all users for accessing the GUI.
These roles cannot be changed or deleted. You can create additional roles and configure the following
options:
Configure role-based authorization by assigning user roles locally or using remote AAA servers.
Configure user profiles on a remote AAA server to contain role information. This role information
is automatically downloaded and used when the user is authenticated through the remote AAA
server.
Note If a user belongs only to one of the newly created roles and that role is subsequently deleted, then the
user immediately defaults to the network-operator role.
Accounting
The accounting feature tracks and maintains a log of every management configuration used to access the
switch. This information can be used to generate reports for troubleshooting and auditing purposes.
Accounting logs can be stored locally or sent to remote AAA servers.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Server Groups
You can specify remote AAA servers for authentication, authorization, and accounting using server
groups. A server group is a set of remote AAA servers implementing the same AAA protocol. The
purpose of a server group is to provide for failover servers in case a remote AAA server fails to respond.
If the first remote server in the group fails to respond, the next remote server in the group is tried until
one of the servers sends a response. If all the AAA servers in the server group fail to respond, then that
server group option is considered a failure. If required, you can specify multiple server groups. If the
Cisco MDS switch encounters errors from the servers in the first group, it tries the servers in the next
server group.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Cisco MDS NX-OS does not support all numeric usernames, whether created with TACACS+ or
RADIUS, or created locally. Local username with all numerics cannot be created. If an all numeric
username exists on an AAA server and is entered during login, the user is not logged in.
Note Even if local is not specified as one of the options, it is tried when all other configured options fail.
When RADIUS times out, local login is always attempted. For this local login to be successful, a local
account for the user with the same password should exist, and the RADIUS timeout and retries should
take less than 40 seconds. The user is authenticated if the username and password exist in the local
authentication configuration.
testing
Note The monitoring interval for alive servers and dead servers is different and can be configured by the user.
The AAA server monitoring is performed by sending a test authentication request to the AAA server.
The user name and password to be used in the test packet can be configured.
See the Configuring RADIUS Server Monitoring Parameters section on page 41-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Log in to the required switch in the Cisco MDS 9000 Family, using the Telnet, SSH, Fabric
Manager/Device Manager, or console login options.
Step 2 When you have configured server groups using the server group authentication method, an
authentication request is sent to the first AAA server in the group.
If the AAA server fails to respond, then the next AAA server is contacted and so on until the remote
server responds to the authentication request.
If all AAA servers in the server group fail to respond, then the servers in the next server group are
contacted.
If all configured methods fail, then the local database is used for authentication.
Step 3 When you are successfully authenticated through a remote AAA server, then the following possible
actions are taken:
If the AAA server protocol is RADIUS, then user roles specified in the cisco-av-pair attribute are
downloaded with an authentication response.
If the AAA server protocol is TACACS+, then another request is sent to the same server to get the
user roles specified as custom attributes for the shell.
If user roles are not successfully retrieved from the remote AAA server, then the user is assigned the
network-operator role.
Step 4 When your user name and password are successfully authenticated locally, you are allowed to log in, and
you are assigned the roles configured in the local database.
Figure 41-2 shows a flow chart of the authorization and authentication process.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Start
Incoming
Incoming Local
access
access
request to
switch
switch
Remote
No more
First or Local
servers left Success Access
next server database
lookup permitted
lookup
Found a Failure
RADIUS server
RADIUS Denied
Lookup No access
response
Accept
Access
permitted 105229
Note No more server groups left = no response from any server in all server groups.
No more servers left = no response from any server within this server group.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
About the Default RADIUS Server Encryption Type and Preshared Key
You need to configure the RADIUS preshared key to authenticate the switch to the RADIUS server. The
length of the key is restricted to 64 characters and can include any printable ASCII characters (white
spaces are not allowed). You can configure a global key to be used for all RADIUS server configurations
on the switch.
You can override this global key assignment by explicitly using the key option when configuring an
individual RADIUS server.
Configuring the Default RADIUS Server Encryption Type and Preshared Key
To configure the default RADIUS server encryption type and preshared key using Fabric Manager,
follow these steps:
Step 1 Expand Switches > Security > AAA, and then select RADIUS.
You see the RADIUS configuration in the Information pane.
Step 2 Click the Defaults tab.
You see the RADIUS default settings as shown in Figure 41-3.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security > AAA and then select RADIUS.
You see the RADIUS configuration in the Information pane.
Step 2 Choose the Defaults tab.
You see the RADIUS default settings.
Step 3 Fill in the Timeout and Retransmits fields for authentication attempts.
Step 4 Click the Apply Changes icon to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security > AAA, and then select RADIUS.
You see the RADIUS configuration in the Information pane.
Step 2 Click the Servers tab.
You see any existing RADIUS servers.
Step 3 Click Create Row to add a new RADIUS server.
You see the Create RADIUS Server dialog box shown in Figure 41-4.
Step 4 Select the switches that you want to assign as RADIUS servers.
Step 5 Assign an index number to identify the RADIUS server.
Step 6 Select the IP address type for the RADIUS server.
Step 7 Fill in the IP address or name for the RADIUS server.
Step 8 (Optional) Modify the authentication and accounting ports used by this RADIUS server.
Step 9 Select the appropriate key type for the RADIUS server.
Step 10 Select the TimeOut value in seconds. The valid range is 0 to 60 seconds.
Step 11 Select the number of times the switch tries to connect to a RADIUS server(s) before reverting to local
authentication.
Step 12 Enter the test idle time interval value in minutes. The valid range is 1 to 1440 minutes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 13 Enter the test user with the default password. The default username is test.
Step 14 Click Create to save these changes.
Note The default idle timer value is 0 minutes. When the idle time interval is 0 minutes, periodic RADIUS
server monitoring is not performed.
To configure the test idle timer, see Configuring a RADIUS Server section on page 41-10.
Note We recommend that the test username not be the same as an existing username in the RADIUS database
for security reasons.
To configure the optional username and password for periodic RADIUS server status testing, see
Configuring a RADIUS Server section on page 41-10.
Note For security reasons we recommend that you do not use a username that is configured on your RADIUS
server as a test username.
You can configure this option to test the server periodically, or you can run a one-time only test.
Step 1 Expand Switches > Security > AAA, and then select RADIUS.
You see the RADIUS configuration in the Information pane.
Step 2 Click the Servers tab.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security > AAA, and then select RADIUS.
You see the RADIUS configuration in the Information pane.
Step 2 Click the Statistics tab.
You see the RADIUS server statistics.
Step 1 Expand Switches > Security > AAA, and then select RADIUS.
You see the RADIUS configuration in the Information pane.
Step 2 Click the Defaults tab.
You see the RADIUS default settings.
Step 3 Check the DirectedReq check box for the RADIUS server.
Step 4 Click the Apply Changes icon to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Where protocol is a Cisco attribute for a particular type of authorization, separator is = (equal sign) for
mandatory attributes, and * (asterisk) is for optional attributes.
When you use RADIUS servers to authenticate yourself to a Cisco MDS 9000 Family switch, the
RADIUS protocol directs the RADIUS server to return user attributes, such as authorization
information, along with authentication results. This authorization information is specified through
VSAs.
VSA Format
The following VSA protocol options are supported by the Cisco NX-OS software:
Shell protocolUsed in Access-Accept packets to provide user profile information.
Accounting protocolUsed in Accounting-Request packets. If a value contains any white spaces,
it should be put within double quotation marks.
The following attributes are supported by the Cisco NX-OS software:
rolesThis attribute lists all the roles to which the user belongs. The value field is a string storing
the list of group names delimited by white space. For example, if you belong to roles vsan-admin
and storage-admin, the value field would be vsan-admin storage-admin. This subattribute is
sent in the VSA portion of the Access-Accept frames from the RADIUS server, and it can only be
used with the shell protocol value. These are two examples using the roles attribute:
shell:roles=network-admin vsan-admin
shell:roles*network-admin vsan-admin
When an VSA is specified as shell:roles*network-admin vsan-admin, this VSA is flagged as
an optional attribute, and other Cisco devices ignore this attribute.
accountinginfoThis attribute stores additional accounting information besides the attributes
covered by a standard RADIUS accounting protocol. This attribute is only sent in the VSA portion
of the Account-Request frames from the RADIUS client on the switch, and it can only be used with
the accounting protocol-related PDUs.
If the roll option in the cisco-av-pair attribute is not set, the default user role is network-operator.
The VSA format optionally specifies your SNMPv3 authentication and privacy protocol attributes also
as follows:
shell:roles="roleA roleB..." snmpv3:auth=SHA priv=AES-128
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The SNMPv3 authentication protocol options are SHA and MD5. The privacy protocol options are
AES-128 and DES. If these options are not specified in the cisco-av-pair attribute on the ACS server,
MD5 and DES are used by default.
About TACACS+
TACACS+ is a client/server protocol that uses TCP (TCP port 49) for transport requirements. All
switches in the Cisco MDS 9000 Family provide centralized authentication using the TACACS+
protocol. The TACACS+ has the following advantages over RADIUS authentication:
Provides independent, modular AAA facilities. Authorization can be done without authentication.
Uses the TCP transport protocol to send data between the AAA client and server, making reliable
transfers with a connection-oriented protocol.
Encrypts the entire protocol payload between the switch and the AAA server to ensure higher data
confidentiality. The RADIUS protocol only encrypts passwords.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Timeout value
Number of retransmission attempts
Allowing the user to specify a TACACS+ server at login
About the Default TACACS+ Server Encryption Type and Preshared Key
You need to configure the TACACS+ preshared key to authenticate the switch to the TACACS+ server.
The length of the key is restricted to 64 characters and can include any printable ASCII characters (white
spaces are not allowed). You can configure a global key to be used for all TACACS+ server
configurations on the switch.
You can override this global key assignment by explicitly using the key option when configuring and
individual TACACS+ server.
Setting the Default TACACS+ Server Encryption Type and Preshared Key
To configure the default TACACS+ server encryption type and preshared key using Fabric Manager,
follow these steps:
Step 1 Expand Switches > Security > AAA, and then select TACACS+.
You see the TACACS+ configuration in the Information pane.
Step 2 If the Defaults tab is dimmed, click the CFS tab.
Step 3 Click the Defaults tab.
You see the TACACS+ default settings.
Step 4 Select plain or encrypted from the AuthType drop-down menu and set the key in the Auth Key field.
Step 5 Click the Apply Changes icon to save the changes.
Step 1 Expand Switches > Security > AAA, and then select TACACS+.
You see the TACACS+ configuration in the Information pane.
Step 2 Choose the Defaults tab. (If the Defaults tab is disabled, click the CFS tab first.)
You see the TACACS+ default settings.
Step 3 Supply values for the Timeout and Retransmits fields for authentication attempts.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Prior to Cisco MDS SAN-OS Release 2.1(2), you can use the dollar sign ($) in the key but the key must
be enclosed in double quotes, for example k$. The percent sign (%) is not allowed. In Cisco MDS
SAN-OS Release 2.1(2) and later, you can use the dollar sign ($) without double quotes and the percent
sign (%) in global secret keys.
You can configure global values for the secret key for all TACACS+ servers.
Note If secret keys are configured for individual servers, those keys override the globally configured key.
Step 1 Expand Switches > Security > AAA, and then select TACACS+.
You see the TACACS+ configuration in the Information pane.
Step 2 Choose the Servers tab.
You see any existing TACACS+ servers.
Step 3 Click Create Row to add a new TACACS+ server.
You see the Create TACACS+ Server dialog box as shown in Figure 41-5.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select the switches that you want to assign as TACACS servers.
Step 5 Assign an index number to identify the TACACS server.
Step 6 Select the IP address type for the TACACS server.
Step 7 Fill in the IP address or name for the TACACS server.
Step 8 Modify the authentication and accounting ports used by this TACACS server.
Step 9 Select the appropriate key type for the TACACS server.
Step 10 Select the TimeOut value in seconds. The valid range is 0 to 60 seconds.
Step 11 Select the number of times the switch tries to connect to a TACACS server(s) before reverting to local
authentication.
Step 12 Enter the test idle time interval value in minutes. The valid range is 1 to 1440 minutes.
Step 13 Enter the test user with the default password. The default username is test.
Step 14 Click Create to save these changes.
Note We recommend that you do not configure the test user on your TACACS+ server for security reasons.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You can configure this option to test the server periodically, or you can run a one-time only test.
Step 1 Expand Switches > Security > AAA, and then select TACACS+.
You see the TACACS+ configuration in the Information pane.
Step 2 Choose the Statistics tab.
You see the TACACS+ server statistics.
Step 1 Expand Switches > Security > AAA, and then select TACACS+.
You see the TACACS+ configuration in the Information pane.
Step 2 Click the Defaults tab.
You see the TACACS+ default settings.
Step 3 Check the DirectedReq check box.
Step 4 Click the Apply Changes icon to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You can also configure optional custom attributes to avoid conflicts with non-MDS Cisco switches using
the same AAA servers.
cisco-av-pair*shell:roles="network-admin vsan-admin"
or
shell:roles*"network-admin vsan-admin
Note TACACS+ custom attributes can be defined on an Access Control Server (ACS) for various services (for
example, shell). Cisco MDS 9000 Family switches require the TACACS+ custom attribute for the service
shell to be used for defining roles.
Open TACACS+
cisco-av-pair*shell:roles="network-admin"
cisco-av-pair=shell:roles*"network-admin"
Server Groups
You can specify one or more remote AAA servers to authenticate users using server groups. All members
of a group must belong to the same protocol, either RADIUS or TACACS+. The servers are tried in the
same order in which you configure them.
The AAA server monitoring feature can mark an AAA server as dead. You can configure a period of time
in minutes to elapse before the switch sends requests to a dead AAA server. (See the AAA Server
Monitoring section on page 41-5.)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note For an MDS switch to participate in AAA server configuration distribution, it must be running Cisco
MDS SAN-OS Release 2.0(1b) or later, or Cisco NX-OS 4.1(1).
Step 1 Expand Switches > Security > AAA, and then select RADIUS.
You see the RADIUS configuration in the Information pane.
Step 2 Click the CFS tab. You see the RADIUS CFS configuration.
Step 3 Choose enable from the Admin drop-down list for all switches that you want to enable CFS for
RADIUS.
Step 4 Click Apply Changes to distribute these changes through the fabric.
To enable TACACS+ server distribution using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security > AAA, and then select TACACS+.
You see the TACACS+ configuration in the Information pane.
Step 2 Click the CFS tab.
You see the TACACS+ CFS configuration.
Step 3 Choose enable from the Admin drop-down list for all switches that you want to enable CFS on for
TACACS+.
Step 4 Click Apply Changes to distribute these changes through the fabric.
Note After you issue the first configuration command related to AAA servers, all server and global
configurations that are created (including the configuration that caused the distribution session start) are
stored in a temporary buffer, not in the running configuration.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security > AAA, and then select RADIUS or select TACACS+.
Step 2 Click the CFS tab.
You see the distribution status on the CFS tab.
Step 3 Click the pending or running radio button.
Step 4 Click Apply Changes to save the changes.
Step 5 Click the Servers tab to view the pending or running configuration.
Step 1 Expand Switches > Security > AAA, and then select either RADIUS or TACACS+. You see the
RADIUS or TACACS+ configuration in the Information pane.
Step 2 Choose the CFS tab. You see the RADIUS or TACACS+ CFS configuration.
Step 3 Choose commitChanges in the Config Action drop-down list for all switches that you want to enable
CFS for RADIUS or TACACS+.
Step 4 Click Apply Changes to distribute the changes through the fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To discard RADIUS or TACACS+ distribution using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security > AAA, and then select either RADIUS or TACACS+. You see either the
RADIUS or TACACS+ configuration in the Information pane.
Step 2 Click the CFS tab. You see either the RADIUS or TACACS+ CFS configuration.
Step 3 Choose abort from the Config Action drop-down list for each switch that should discard the pending
RADIUS or TACACS+ distribution.
Step 4 Click Apply Changes.
Clearing Sessions
To clear a RADIUS or TACACS+ distribution using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security > AAA and then select either RADIUS or TACACS+.
You see either the RADIUS or TACACS+ configuration in the Information pane.
Step 2 Choose the CFS tab. You see either the RADIUS or TACACS+ CFS configuration.
Step 3 Choose clear from the Config Action drop-down list for each switch that should clear the pending
RADIUS or TACACS+ distribution.
Step 4 Click Apply Changes.
Caution If there is a conflict between two switches in the server ports configured, the merge fails.
MSCHAP Authentication
Microsoft Challenge Handshake Authentication Protocol (MSCHAP) is the Microsoft version of CHAP.
You can use MSCHAP for user logins to an MDS switch through a remote authentication server
(RADIUS or TACACS+).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Vendor-ID
Number Vendor-Type Number Vendor-Specific Attribute Description
311 11 MSCHAP-Challenge Contains the challenge sent by an AAA server to an
MSCHAP user. It can be used in both
Access-Request and Access-Challenge packets.
211 11 MSCHAP-Response Contains the response value provided by an
MS-CHAP user in response to the challenge. It is
only used in Access-Request packets.
Step 3 Check the AuthTypeMSCHAP check box to use MSCHAP to authenticate users on the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Use this option cautiously. If configured, any user can access the switch at any time.
Refer to the Cisco MDS 9000 Family CLI Configuration Guide to configure this option.
Caution Cisco MDS NX-OS does not support all numeric usernames, whether created with RADIUS or
TACACS+, or created locally. Local users with all numeric names cannot be created. If an all numeric
user name exists on an AAA server and is entered during login, the user is not logged in.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 41-11 Configuring Multiple Roles with SNMPv3 Attributes When Using RADIUS
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 41-12 Configuring the network-admin Role with SNMPv3 Attributes When Using TACACS+
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 41-13 Configuring Multiple Roles with SNMPv3 Attributes When Using TACACS+
Default Settings
Table 41-2 lists the default settings for all switch security features in any switch.
Parameters Default
Roles in Cisco MDS switches Network operator (network-operator)
AAA configuration services Local
Authentication port 1812
Accounting port 1813
Preshared key communication Clear text
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
RADIUS server timeout 1 (one) second
RADIUS server retries Once
RADIUS server directed requests Disabled
TACACS+ Disabled
TACACS+ servers None configured
TACACS+ server timeout 5 seconds
TACACS+ server directed requests Disabled
AAA server distribution Disabled
Accounting log size 250 KB
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 42
Configuring IPv4 and IPv6 Access Control Lists
Cisco MDS 9000 Family switches can route IP version 4 (IPv4) traffic between Ethernet and Fibre
Channel interfaces. The IP static routing feature routes traffic between VSANs. To do so, each VSAN
must be in a different IPv4 subnetwork. Each Cisco MDS 9000 Family switch provides the following
services for network management systems (NMS):
IP forwarding on the out-of-band Ethernet interface (mgmt0) on the front panel of the supervisor
modules.
IP forwarding on the in-band Fibre Channel interface using the IP over Fibre Channel (IPFC)
functionIPFC specifies how IP frames can be transported over Fibre Channel using encapsulation
techniques. IP frames are encapsulated into Fibre Channel frames so NMS information can cross the
Fibre Channel network without using an overlay Ethernet network.
IP routing (default routing and static routing)If your configuration does not need an external
router, you can configure a default route using static routing.
Switches are compliant with RFC 2338 standards for Virtual Router Redundancy Protocol (VRRP)
features. VRRP is a restartable application that provides a redundant, alternate path to the gateway
switch.
IPv4 Access Control Lists (IPv4-ACLs and IPv6-ACLs) provide basic network security to all switches
in the Cisco MDS 9000 Family. IPv4-ACLs and IPv6-ACLs restrict IP-related traffic based on the
configured IP filters. A filter contains the rules to match an IP packet, and if the packet matches, the rule
also stipulates if the packet should be permitted or denied.
Each switch in the Cisco MDS 9000 Family can have a maximum total of 128 IPv4-ACLs or 128
IPv6-ACLs and each IPv4-ACL or IPv6-ACL can have a maximum of 256 filters.
This chapter includes the following sections:
IPv4-ACL and IPv6-ACL Configuration Guidelines, page 42-2
About Filter Contents, page 42-2
Creating IPv4-ACLs or IPv6-ACLs with the IP-ACL Wizard, page 42-5
Creating IPv4-ACLs or IPv6-ACLs in Device Manager, page 42-6
Reading the IP-ACL Log Dump, page 42-9
Applying an IP-ACL to an Interface, page 42-10
Example IP-ACL Configuration, page 42-12
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip If IPv4-ACLs or IPv6-ACLs are already configured in a Gigabit Ethernet interface, you cannot
add this interface to an Ethernet PortChannel group. See the Gigabit Ethernet IPv4-ACL
Guidelines section on page 53-6 for guidelines on configuring IPv4-ACLs.
Caution Do not apply IPv4-ACLs or IPv6-ACLs to only one member of a PortChannel group. Apply
IPv4-ACLs or IPv6-ACLs to the entire channel group.
Configure the order of conditions accurately. As the IPv4-ACL or the IPv6-ACL filters are
sequentially applied to the IP flows, only the first match determines the action taken. Subsequent
matches are not considered. Be sure to configure the most important condition first. If no conditions
match, the software drops the packet.
Configure explicit deny on the IP Storage Gigabit Ethernet ports to apply IP ACLs because implicit
deny does not take effect on these ports.
Protocol Information
The protocol information is required in each filter. It identifies the name or number of an IP protocol.
You can specify the IP protocol in one of two ways:
Specify an integer ranging from 0 to 255. This number represents the IP protocol.
Specify the name of a protocol including, but not restricted to, Internet Protocol (IP), Transmission
Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol
(ICMP).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note When configuring IPv4-ACLs or IPv6-ACLs on Gigabit Ethernet interfaces, only use the TCP
or ICMP options.
Address Information
The address information is required in each filter. It identifies the following details:
SourceThe address of the network or host from which the packet is being sent.
Source-wildcardThe wildcard bits applied to the source.
DestinationThe number of the network or host to which the packet is being sent.
Destination-wildcardThe wildcard bits applied to the destination.
Specify the source and source-wildcard or the destination and destination-wildcard in one of two ways:
Using the 32-bit quantity in four-part, dotted decimal format (10.1.1.2/0.0.0.0 is the same as host
10.1.1.2).
Each wildcard bit set to zero indicates that the corresponding bit position in the packet's IPv4
address must exactly match the bit value in the corresponding bit position in the source.
Each wildcard bit set to one indicates that both a zero bit and a one bit in the corresponding
position of the packet's IPv4 or IPv6 address will be considered a match to this access list entry.
Place ones in the bit positions you want to ignore. For example, 0.0.255.255 requires an exact
match of only the first 16 bits of the source. Wildcard bits set to one do not need to be contiguous
in the source-wildcard. For example, a source-wildcard of 0.255.0.64 would be valid.
Using the any option as an abbreviation for a source and source-wildcard or destination and
destination-wildcard (0.0.0.0/255.255.255.255)
Port Information
The port information is optional. To compare the source and destination ports, use the eq (equal) option,
the gt (greater than) option, the lt (less than) option, or the range (range of ports) option. You can specify
the port information in one of two ways:
Specify the number of the port. Port numbers range from 0 to 65535. Table 42-1 displays the port
numbers recognized by the Cisco NX-OS software for associated TCP and UDP ports.
Specify the name of a TCP or UDP port as follows:
TCP port names can only be used when filtering TCP.
UDP port names can only be used when filtering UDP.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
ICMP Information
IP packets can be filtered based on the following optional ICMP conditions:
icmp-typeThe ICMP message type is a number from 0 to 255.
icmp-codeThe ICMP message code is a number from 0 to 255.
Table 42-2 displays the value for each ICMP type.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
ToS Information
IP packets can be filtered based on the following optional ToS conditions:
ToS levelThe level is specified by a number from 0 to 15.
ToS nameThe name can be max-reliability, max-throughput, min-delay, min-monetary-cost, and
normal.
Step 1 Create an IPv4-ACL or an IPv6-ACL by specifying a filter name and one or more access condition(s).
Filters require the source and destination address to match a condition. Use optional keywords to
configure finer granularity.
Note The filter entries are executed in sequential order. You can only add the entries to the end of the
list. Take care to add the entries in the correct order.
To create an ordered list of IP filters in a named IPv4-ACL or IPv6-ACL profile using the IPv4-ACL
Wizard in Fabric Manager, follow these steps:
Step 1 Click the IP ACL Wizard icon from the Fabric Manager toolbar (see Figure 42-1).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you are creating an IPv6-ACL, check the IPv6 check box.
Step 3 Click Add to add a new rule to this IP-ACL. You see a new rule in the table with default values.
Step 4 Modify the Source IP and Source Mask as necessary for your filter.
Step 5 Choose the appropriate filter type from the Application drop-down list.
Step 6 Choose permit or deny from the Action drop-down list.
Step 7 Repeat Step 3 through Step 6 for additional IP filters.
Step 8 Click Up or Down to order the filters in this IP-ACL.
Tip Order the IP filters carefully. Traffic is compared to the IP filters in order. The first match is
applied and the rest are ignored.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see the Create IP ACL Profiles dialog box shown in Figure 42-3.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 Choose either permit or deny for the Action and set the IP Number in the Protocol field. The drop-down
menu provides common filtered protocols.
Step 8 Set the source IP address you want this filter to match against and the wildcard mask, or check the any
check box to match this filter against any IP address.
This creates an IP filter that will check the source IP address of frames.
Note The wildcard mask denotes a subset of the IP address you want to match against. This allows a
range of addresses to match against this filter.
Step 9 Set the transport layer source port range if the protocol chosen is TCP or UDP.
Step 10 Repeat Step 8 and Step 9 for the destination IP address and port range.
This creates an IP filter that will check the destination IP address of frames.
Step 11 Set the ToS, ICMPType, and ICMPCode fields as appropriate.
Step 12 Check the TCPEstablished check box if you want to match TCP connections with
ACK,FIN,PSH,RST,SYN or URG control bits set.
Step 13 Check the LogEnabled check box if you want to log all frames that match this IP filter.
Step 14 Click Create to create this IP filter and add it to your IP-ACL.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the IP-ACL you want to modify and click Rules.
You see the list of IP filters associated with this IP-ACL (see Figure 42-4).
Step 3 Select the filter that you want to delete and click Delete to delete that IP filter.
Deleting IP-ACLs
You must delete the association between the IP-ACL and interfaces before deleting the IP-ACL.
To delete an IP-ACL using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select IP ACL from the Physical Attributes pane.
You see the IP-ACL configuration in the Information pane.
Step 2 Click the Profiles tab.
You see a list of switches, ACLs, and profile names.
Step 3 Select the row you want to delete. To delete multiple rows, hold down the Shift key while selecting rows.
Step 4 Click Delete Row. The IP-ACLs are deleted.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip Apply the IP-ACL on the interface closest to the source of the traffic.
When you are trying to block traffic from source to destination, you can apply an inbound IPv4-ACL to
M0 on Switch 1 instead of an outbound filter to M1 on Switch 3 (see Figure 42-6).
traffic M0 M1 traffic
source destination
120711
Switch 1 Switch 2 Switch 3
The access-group option controls access to an interface. Each interface can only be associated with one
IP-ACL per direction. The ingress direction can have a different IP-ACL than the egress direction. The
IP-ACL becomes active when applied to the interface.
Caution If you apply an IP-ACL to an interface before creating it, all packets in that interface are dropped because
the IP-ACL is empty.
The terms in, out, source, and destination are used as referenced by the switch:
InTraffic that arrives at the interface and goes through the switch; the source is where it
transmitted from and the destination is where it is transmitted to (on the other side of the router).
Tip The IP-ACL applied to the interface for the ingress traffic affects both local and remote traffic.
OutTraffic that has already been through the switch and is leaving the interface; the source is
where it transmitted from and the destination is where it is transmitted to.
Tip The IP-ACL applied to the interface for the egress traffic only affects local traffic.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select IP ACL in the Physical Attributes pane.
You see the IP-ACL configuration in the Information pane.
Step 2 Click the Interfaces tab.
You see a list of interfaces and associated IP-ACLs.
Step 3 Click Create Row.
You see the Create Interfaces dialog box shown in Figure 42-7.
Step 4 (Optional) remove the switches you do not want to include in the IP-ACL by unchecking the check boxes
next to the switch addresses.
Set the interface you want associated with an IPv4-ACL or IPv6-ACL in the Interface field.
Step 5 Choose a ProfileDirection (either inbound or outbound).
Step 6 Enter the IP-ACL name in the Profile Name field.
Note This IP-ACL name must have already been created using the Create Profiles dialog box. If not,
no filters will be enabled until you to go to the Create Profiles dialog box and create the profile.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The wildcard mask denotes a subset of the IP Address you want to match against. This
allows a range of addresses to match against this filter.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 43
Configuring Certificate Authorities and Digital
Certificates
Public Key Infrastructure (PKI) support provides the means for the Cisco MDS 9000 Family switches to
obtain and use digital certificates for secure communication in the network. PKI support provides
manageability and scalability for IPsec/IKE and SSH.
This chapter includes the following sections:
About CAs and Digital Certificates, page 43-1
Configuring CAs and Digital Certificates, page 43-6
Example Configurations, page 43-17
Maximum Limits, page 43-36
Default Settings, page 43-37
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The following list summarizes the relationship between trust points, RSA key-pairs, and identity
certificates:
A trust point corresponds to a specific CA that the MDS switch trusts for peer certificate verification
for any application (such as IKE or SSH).
An MDS switch can have many trust points and all applications on the switch can trust a peer
certificate issued by any of the trust point CAs.
A trust point is not restricted to a specific application.
An MDS switch enrolls with the CA corresponding to the trust point to obtain an identity certificate.
You can enroll your switch with multiple trust points thereby obtaining a separate identity certificate
from each trust point. The identity certificates are used by applications depending upon the purposes
specified in the certificate by the issuing CA. The purpose of a certificate is stored in the certificate
as certificate extensions.
When enrolling with a trust point, you must specify an RSA key-pair to be certified. This key-pair
must be generated and associated to the trust point before generating the enrollment request. The
association between the trust point, key-pair, and identity certificate is valid until it is explicitly
removed by deleting the certificate, key-pair, or trust point.
The subject name in the identity certificate is the fully qualified domain name for the MDS switch.
You can generate one or more RSA key-pairs on a switch and each can be associated to one or more
trust points. But no more than one key-pair can be associated to a trust point, which means only one
identity certificate is allowed from a CA.
If multiple identity certificates (each from a distinct CA) have been obtained, the certificate that an
application selects to use in a security protocol exchange with a peer is application specific (see the
IPsec Digital Certificate Support section on page 44-7 and the SSH Authentication Using Digital
Certificates section on page 39-19).
You do not need to designate one or more trust points for an application. Any application can use
any certificate issued by any trust point as long as the certificate purpose satisfies the application
requirements.
You do not need more than one identity certificate from a trust point or more than one key-pair to
be associated to a trust point. A CA certifies a given identity (name) only once and does not issue
multiple certificates with the same subject name. If you need more than one identity certificate for
a CA, then define another trust point for the same CA, associate another key-pair to it, and have it
certified, provided CA allows multiple certificates with the same subject name.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Fabric Manager does not support cut and paste. Instead, it allows the enrollment request (certificate
signing request) to be saved in a file to be sent manually to the CA.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
OCSP Support
Online Certificate Status Protocol (OCSP) facilitates online certificate revocation checking. You can
specify an OCSP URL for each trust point. Applications choose the revocation checking mechanisms in
a specified order. The choices are CRL, OCSP, none, or a combination of these methods.
Import and Export Support for Certificates and Associated Key Pairs
As part of the CA authentication and enrollment process, the subordinate CA certificate (or certificate
chain) and identity certificates can be imported in standard PEM (base64) format.
The complete identity information in a trust point can be exported to a file in the password-protected
PKCS#12 standard format. It can be later imported to the same switch (for example, after a system crash)
or to a replacement switch. The information in a PKCS#12 file consists of the RSA key-pair, the identity
certificate, and the CA certificate (or chain).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Changing the host name or IP domain name after generating the certificate can invalidate the certificate.
To configure the host name and IP domain name, refer to the Cisco MDS 9000 NX-OS CLI Configuration
Guide.
Step 1 Expand Switches > Security and then select PKI in the Information pane.
Step 2 Click the RSA Key-Pair tab.
You see the information shown in Figure 43-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select the switches for which you want to create the RSA key-pair.
Step 5 Assign a name to the RSA key-pair.
Step 6 Select the Size or modulus values. Valid modulus values are 512, 768, 1024, 1536, and 2048.
Note The security policy (or requirement) at the local site (MDS switch) and at the CA (where
enrollment is planned) are considered in deciding the appropriate key modulus.
Note The maximum number of key-pairs you can configure on a switch is 16.
Step 7 Check the Exportable check box if you want the key to be exportable.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security then select PKI in the Physical Attributes pane.
Step 2 Click the Trust Point tab in the Information Pane.
You see the information shown in Figure 43-3.
Step 4 Select the switch for which you are creating the trust point CA from the Switch drop-down menu.
Step 5 Assign a name to the trust point CA.
Step 6 Select a key-pair name to be associated with this trust point for enrollment. It was generated earlier in
the Generating an RSA Key-Pair section on page 43-6. Only one RSA key-pair can be specified per
CA.
Step 7 From the RevokeCheckMethod drop-down menu, select the certificate revocation method that you would
like to use (see Figure 43-4). You can use CRL, OCSP, CRL OCSP, or OCSP CRL to check for certificate
revocation. The CRL OCSP option checks for revoked certificates first in the locally stored CRL. If not
found, the switch uses OCSP to check the revoked certificates on the URL specified in Step 7.
Step 8 Enter the OCSP URL if you selected an OCSP certificate revocation method.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The OSCP URL must be configured before configuring the revocation checking method.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Authenticating the CA
The configuration process of trusting a CA is complete only when the CA is authenticated to the MDS
switch. The switch must authenticate the CA. It does this by obtaining the self-signed certificate of the
CA in PEM format, which contains the public key of the CA. Because the certificate of the CA is
self-signed (the CA signs its own certificate) the public key of the CA should be manually authenticated
by contacting the CA administrator to compare the fingerprint of the CA certificate.
Note If the CA being authenticated is not a self-signed CA (that is, it is a subordinate CA to another CA, which
itself may be a subordinate to yet another CA, and so on, finally ending in a self-signed CA), then the
full list of the CA certificates of all the CAs in the certification chain needs to be input during the CA
authentication step. This is called the CA certificate chain of the CA being authenticated. The maximum
number of certificates in a CA certificate chain is 10.
Step 1 Expand Switches > Security then select PKI in the Physical Attributes pane.
Step 2 Click the Trust Point Actions tab in the Information pane.
You see the information shown in Figure 43-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 From the Command field drop-down menu, select the appropriate option. Available options are caauth,
cadelete, certreq, certimport, certdelete, pkcs12import, and pkcs12export. The caauth option is
provided to authenticate a CA and install its CA certificate or certificate chain in a trust point.
Step 4 Click the Browse button in the URL field and select the appropriate import certificate file from the
Bootflash Files dialog box. It is the file name containing the CA certificate or chain in the
bootflash:filename format.
Note If you do not see the required file in the Import Certificate dialog box, make sure that you copy
the file to bootflash. See Copying Files to Bootflash section on page 9.
Note For subordinate CA authentication, the full chain of CA certificates ending in a self-signed CA is
required because the CA chain is needed for certificate verification as well as for PKCS#12 format
export.
Confirming CA Authentication
As mentioned in step 5 of Authenticating the CA section on page 43-10, CA authentication is required
to be followed by CA confirmation in order to accept the CA certificate based on its fingerprint
verification.
To confirm CA authentication using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select PKI in the Physical Attributes pane.
Step 2 Click the Trust Point Actions tab in the Information Pane.
Step 3 Make a note of the CA certificate fingerprint displayed in the IssuerCert FingerPrint column for the trust
point row in question. Compare the CA certificate fingerprint with the fingerprint already communicated
by the CA (obtained from the CA web site).
If the fingerprints match exactly, accept the CA with the certconfirm command in the Command
drop-down menu. Otherwise, reject the CA with the certnoconfirm command.
Step 4 If you selected certconfirm in step 3, click Command and select the certconfirm action from the
drop-down menu. Click Apply Changes.
If you selected certnoconfirm in step 3, click Command and select the certnoconfirm action
drop-down menu. Click Apply Changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You must authenticate the CA before configuring certificate revocation checking.
Fabric Manager allows you to configure certificate revocation checking methods when you are creating
a trust point CA. See Creating a Trust Point CA Association section on page 43-8.
Step 1 Expand Switches > Security and then select PKI in the Physical Attributes pane.
Step 2 Click the Trust Point Actions tab in the Information pane (see Figure 43-8).
Step 3 Select the certreq option from the Command drop-down menu. This generates a pkcs#10 certificate
signing request (CSR) needed for an identity certificate from the CA corresponding to this trust point
entry. This entry requires an associated key-pair. The CA certificate or certificate chain should already
be configured through the caauth action. See Authenticating the CA section on page 43-10.
Step 4 Enter the output file name for storing the generated certificate request. It will be used to store the CSR
generated in PEM format. Use the format bootflash:filename. This CSR should be submitted to the CA
to get the identity certificate. Once the identity certificate is obtained, it should be installed in this trust
point. See Installing Identity Certificates section on page 43-13.
Step 5 Enter the challenge password to be included in the CSR.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The challenge password is not saved with the configuration. This password is required in the
event that your certificate needs to be revoked, so you must remember this password.
Step 1 Expand Switches > Security and then select PKI in the Physical Attributes pane.
Step 2 Click the Trust Point Actions tab, in the Information pane.
Step 3 Select the certimport option from the Command drop-down menu to import an identity certificate in
this trust point. The identity certificate is obtained from the corresponding CA for a CSR generated
previously (see Generating Certificate Requests section on page 43-12).
Note The identity certificate should be available in PEM format in a file in bootflash.
Step 4 Enter the name of the certificate file that should have been copied to bootflash in the URL field in the
bootflash:filename format.
Step 5 Click Apply Changes to save your changes.
If successful, the values of the identity certificate and its related objects, like the certificate file name,
are automatically updated with the appropriate values as per the corresponding attributes in the identity
certificate.
Step 1 Expand Switches and then select Copy Configuration in the Physical Attributes pane.
Step 2 Select the switch configuration including the RSA key-pairs and certificates.
Step 3 Click Apply Changes to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Copying the configuration to an external server does include the certificates and key-pairs.
Note Only bootflash:filename format is supported when specifying the export and import URL.
To export a certificate and key pair to a PKCS#12-formatted file using Fabric Manager, follow these
steps:
Step 1 Expand Switches > Security and then select PKI in the Physical Attributes pane.
Step 2 Click the Trust Point Actions tab in the Information Pane (see Figure 43-9).
Step 3 Select the pkcs12export option in the Command drop-down menu to export the key-pair, identity
certificate, and the CA certificate or certificate chain in PKCS#12 format from the selected trust point.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Enter the output file name as bootflash:filename to store the exported PKCS#12 identity.
Step 5 Enter the required password. The password is set for encoding the PKCS#12 data. On successful
completion, the exported data is available in bootflash in the specified file.
Step 6 Click Apply Changes to save the changes.
To import a certificate and key pair formatted as a PKCS#12 formatted file, follow these steps:
Step 1 Expand Switches > Security and then select PKI in the Physical Attributes pane.
Step 2 Click the Trust Point Actions tab in the Information pane (see Figure 43-9).
Step 3 Select the pkcs12import option from the Command drop-down menu to import the key-pair, identity
certificate, and the CA certificate or certificate chain in the PKCS#12 format to the selected trust point.
Step 4 Enter the input in the bootflash:filename format, containing the PKCS#12 identity.
Step 5 Enter the required password. The password is set for decoding the PKCS#12 data. On completion, the
imported data is available in bootflash in the specified file.
Step 6 Click Apply Changes to save the changes.
On completion the trust point is created in the RSA key-pair table corresponding to the imported
key-pair. The certificate information is updated in the trust point.
Note The trust point must be empty (with no RSA key-pair associated with it and no CA is associated with it
using CA authentication) for the PKCS#12 file import to succeed.
Configuring a CRL
To configure the CRL from a file to a trust point using Fabric Manager, follow these steps:
Step 1 Click Switches > Security > PKI in the Physical Attributes pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the Trust Point Actions tab in the Information pane.
Step 3 Select the crlimport option from the Command drop-down menu to import the CRL to the selected trust
point.
Step 4 Enter the input file name with the CRL in the bootflash:filename format, in the URL field.
Step 5 Click Apply Changes to save the changes.
Step 1 Click Switches > Security > PKI in the Physical Attributes pane.
Step 2 Click the Trust Point Actions tab in the Information pane.
Step 3 Select the cadelete option from the Command drop-down menu to delete the identity certificate from a
trust point.
Note If the identity certificate being deleted is the last-most or only identity certificate in the device,
you must use the forcecertdelete action to delete it. This ensures that the administrator does not
mistakenly delete the last-most or only identity certificate and leave the applications (such as
IKE and SSH) without a certificate to use.
To delete the identity certificate, click the Trust Point Actions tab and select the certdelete or
forcecertdelete in the Command drop-down menu.
Step 1 Expand Switches > Security and then select PKI in the Physical Attributes pane.
Step 2 Click the RSA Key-Pair tab in the Information pane.
Step 3 Click Delete Row.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note After you delete RSA key-pairs from a switch, ask the CA administrator to revoke your switchs
certificates at the CA. You must supply the challenge password you created when you originally
requested the certificates. See Generating Certificate Requests section on page 43-12.
Example Configurations
This section shows an example of the tasks you can use to configure certificates and CRLs on the Cisco
MDS 9000 Family switches using the Microsoft Windows Certificate server.
This section includes the following topics:
Configuring Certificates on the MDS Switch, page 43-17
Downloading a CA Certificate, page 43-19
Requesting an Identity Certificate, page 43-24
Revoking a Certificate, page 43-30
Generating and Publishing the CRL, page 43-33
Downloading the CRL, page 43-34
Importingthe CRL, page 43-36
Step 1 Choose Switches and set the LogicalName field to configure the switch host name.
Step 2 Choose Switches > Interfaces > Management > DNS and set the DefaultDomainName field to
configure.
Step 3 To create an RSA key-pair for the switch, follow these steps:
a. Choose Switches > Security > PKI and select the RSA Key-Pair tab.
b. Click Create Row and set the name and size field.
c. Check the Exportable check box and click Create.
Step 4 To create a trust point and associate the RSA key-pairs with it, follow these steps:
a. Choose Switches > Security > PKI and select the Trustpoints tab.
b. Click Create Row and set the TrustPointName field.
c. Select the RSA key-pairs from the KeyPairName drop-down menu.
d. Select the certificates revocation method from the CARevoke drop-down menu.
e. Click Create.
Step 5 Choose Switches > Copy Configuration and click Apply Changes to copy the running to startup
configuration and save the trustpoint and key pair.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Download the CA certificate from the CA that you want to add as the trustpoint CA.
Step 7 To authenticate the CA that you want to enroll to the trust point, follow these steps:.
a. Using Device Manager, choose Admin > Flash Files and select Copy and tftp copy the CA
certificate to bootflash.
b. Using Fabric Manager, choose Switches > Security > PKI and select the TrustPoint Actions tab.
c. Select cauth from the Command drop-down menu.
d. Click ... in the URL field and select the CA certificate from bootflash.
e. Click Apply Changes to authenticate the CA that you want to enroll to the trust point.
f. Click the Trust Point Actions tab in the Information Pane.
g. Make a note of the CA certificate fingerprint displayed in the IssuerCert FingerPrint column for the
trust point row in question. Compare the CA certificate fingerprint with the fingerprint already
communicated by the CA (obtained from the CA web site). If the fingerprints match exactly, accept
the CA by performing the certconfirm trust point action. Otherwise, reject the CA by performing
the certnoconfirm trust point action.
h. If you select certconfirm in step g, select the Trust Point Actions tab, select certconfirm from the
command drop-down menu and then click Apply Changes.
i. If you select certnoconfirm in step g, select the Trust Point Actions tab, select the certnoconfirm
from the command drop-down menu and then click Apply Changes.
Step 8 To generate a certificate request for enrolling with that trust point, follow these steps:
a. Select the Trust Point Actions tab in the Information pane.
b. Select certreq from the Command drop-down menu. This generates a pkcs#10 certificate signing
request (CSR) needed for an identity certificate from the CA corresponding to this trust point entry.
c. Enter the output file name for storing the generated certificate request. It should be specified in the
bootflash:filename format and will be used to store the CSR generated in PEM format.
d. Enter the challenge password to be included in the CSR. The challenge password is not saved with
the configuration. This password is required in the event that your certificate needs to be revoked,
so you must remember this password.
e. Click Apply Changes to save the changes.
Step 9 Request an identity certificate from the CA.
Note The CA may require manual verification before issuing the identity certificate.
Note The identity certificate should be available in PEM format in a file in bootflash.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
d. Enter the name of the certificate file which was copied to bootflash, in the URL field in the
bootflash:filename format.
e. Click Apply Changes to save your changes.
If successful, the values of the identity certificate and its related objects, like the certificate file
name, are automatically updated with the appropriate values as per the corresponding attributes in
the identity certificate.
Downloading a CA Certificate
To download a CA certificate from the Microsoft Certificate Services web interface, follow these steps:
Step 1 Select the Retrieve the CA certificate or certificate revocation task radio button in the Microsoft
Certificate Services web interface and click the Next button.
Step 2 Select the CA certificate file to download from the displayed list. Click the Base 64 encoded radio
button, and click the Download CA certificate link.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click the Open button in the File Download dialog box.
Step 4 Click the Copy to File button in the Certificate dialog box and click OK.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Select the Base-64 encoded X.509 (CER) on the Certificate Export Wizard dialog box and click Next.
Step 6 Enter the destination file name in the File name: text box on the Certificate Export Wizard dialog box
and click Next.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 Click the Finish button on the Certificate Export Wizard dialog box.
Step 8 Display the CA certificate stored in Base-64 (PEM) format using the Microsoft Windows type
command.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Select the Request an identity certificate radio button on the Microsoft Certificate Services web interface
and click Next.
Step 2 Select the Advanced Request radio button and click Next.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select the Submit a certificate request using a base64 encoded PKCS#10 file or a renewal request
using a base64 encoded PKCS#7 file radio button and click Next.
Step 4 Paste the base64 PKCS#10 certificate request in the Saved Request text box and click Next. The
certificate request is copied from the MDS switch console (see the Generating Certificate Requests
section on page 43-12 and Configuring Certificates on the MDS Switch section on page 43-17).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Wait one or two days until the certificate is issued by the CA administrator.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 Select the Check on a pending certificate radio button on the Microsoft Certificate Services web
interface and click Next.
Step 8 Select the certificate request you want to check and click Next.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 9 Select Base 64 encoded and click the Download CA certificate link.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 11 Click the Details tab on the Certificate dialog and click the Copy to File button. Select the Base-64
encoded X.509 (.CER) radio button on the Certificate Export Wizard dialog box and click Next.
Step 12 Enter the destination file name in the File name: text box on the Certificate Export Wizard dialog box,
then click Next.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 14 Display the identity certificate in base64-encoded format using the Microsoft Windows type command.
Revoking a Certificate
To revoke a certificate using the Microsoft CA administrator program, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Click the Issued Certificates folder on the Certification Authority tree. From the list, right-click the
certificate you want to revoke.
Step 2 Select All Tasks > Revoke Certificate.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select a reason for the revocation from the Reason code drop-down list, and click Yes.
Step 4 Click the Revoked Certificates folder to list and verify the certificate revocation.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Select Action > All Tasks > Publish on the Certification Authority screen.
Step 2 Click Yes on the Certificate Revocation List dialog box to publish the latest CRL.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Select Request the CA certificate or certificate revocation list radio button on the Microsoft
Certificate Services web interface and click Next.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Enter the destination file name in the Save As dialog box and click Save.
Step 5 Display the CRL using the Microsoft Windows type command.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Importingthe CRL
To import the CRL to the trust point corresponding to the CA, follow these steps:
Step 1 Click Switches > Security > PKI in the Physical Attributes pane.
Step 2 Click the Trust Point Actions tab in the Information pane.
Step 3 Select the crlimport option from the Command drop-down menu to import the CRL to the selected trust
point.
Step 4 Enter the input file name with the CRL in the bootflash:filename format, in the URL field.
Step 5 Click Apply Changes to save the changes.
Note The identity certificate for the switch that was revoked (serial number 0A338EA1000000000074) is
listed at the end.
Maximum Limits
Table 43-1 lists the maximum limits for CAs and digital certificate parameters.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 43-2 lists the default settings for CAs and digital certificate parameters.
Parameters Default
Trust point None
RSA key-pair None
RSA key-pair label Switch FQDN
RSA key-pair modulus 512
RSA key-pair exportable Yes
Revocation check method of trust point CRL.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 44
Configuring IPsec Network Security
IP security (IPsec) protocol is a framework of open standards that provides data confidentiality, data
integrity, and data authentication between participating peers. It is developed by the Internet Engineering
Task Force (IETF). IPsec provides security services at the IP layer, including protecting one or more data
flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a
host. The overall IPsec implementation is the latest version of RFC 2401. Cisco NX-OS IPsec
implements RFC 2402 through RFC 2410.
IPsec uses the Internet Key Exchange (IKE) protocol to handle protocol and algorithm negotiation and
to generate the encryption and authentication keys used by IPsec. While IKE can be used with other
protocols, its initial implementation is with the IPsec protocol. IKE provides authentication of the IPsec
peers, negotiates IPsec security associations, and establishes IPsec keys. IKE uses RFCs 2408, 2409,
2410, and 2412, and additionally implements the draft-ietf-ipsec-ikev2-16.txt draft.
Note The term IPsec is sometimes used to describe the entire protocol of IPsec data services and IKE security
protocols and is other times used to describe only the data services.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
About IPsec
Note IPsec is not supported by the Cisco Fabric Switch for HP c-Class BladeSystem and the Cisco Fabric
Switch for IBM BladeCenter.
IPsec provides security for transmission of sensitive information over unprotected networks such as the
Internet. IPsec acts at the network layer, protecting and authenticating IP packets between participating
IPsec devices (peers).
IPsec provides the following network security services. In general, the local security policy dictates the
use of one or more of these services between two participating IPsec devices:
Data confidentialityThe IPsec sender can encrypt packets before transmitting them across a
network.
Data integrityThe IPsec receiver can authenticate packets sent by the IPsec sender to ensure that
the data has not been altered during transmission.
Data origin authenticationThe IPsec receiver can authenticate the source of the IPsec packets sent.
This service is dependent upon the data integrity service.
Anti-replay protectionThe IPsec receiver can detect and reject replayed packets.
Note The term data authentication is generally used to mean data integrity and data origin authentication.
Within this chapter it also includes anti-replay services, unless otherwise specified.
With IPsec, data can be transmitted across a public network without fear of observation, modification,
or spoofing. This enables applications such as Virtual Private Networks (VPNs), including intranets,
extranets, and remote user access.
IPsec as implemented in Cisco NX-OS software supports the Encapsulating Security Payload (ESP)
protocol. This protocol encapsulates the data to be protected and provides data privacy services, optional
data authentication, and optional anti-replay services.
Note The Encapsulating Security Payload (ESP) protocol is a header inserted into an existing TCP/IP packet,
the size of which depends on the actual encryption and authentication algorithms negotiated. To avoid
fragmentation, the encrypted packet fits into the interface maximum transmission unit (MTU). The path
MTU calculation for TCP takes into account the addition of ESP headers, plus the outer IP header in
tunnel mode, for encryption. The MDS switches allow 100 bytes for packet growth for IPsec encryption.
Note When using IPsec and IKE, each Gigabit Ethernet interface on the IPS module (either on 14+2 LC or
18+4 LC) must be configured in its own IP subnet. If there are multiple Gigabit Ethernet interfaces
configured with IP address or network-mask in the same IP subnet, IKE packets may not be sent to the
right peer and thus IPsec tunnel will not come up.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
iSCSI Servers
IPSec for
securing
iSCSI traffic
IPSec for
securing
MDS_Switch1 FCIP traffic
FC
MDS_Switch 2 MDS_Switch 3
FC
FC WAN
FC Servers IPsec for securing
traffic between
MDS and router
Secure
120481
connection
About IKE
IKE automatically negotiates IPsec security associations and generates keys for all switches using the
IPsec feature. Specifically, IKE provides these benefits:
Allows you to refresh IPsec SAs.
Allows IPsec to provide anti-replay services.
Supports a manageable, scalable IPsec configuration.
Allows dynamic authentication of peers.
Note IKE is not supported on the Cisco Fabric Switch for HP c-Class BladeSystem and the Cisco Fabric
Switch for IBM BladeSystem.
IPsec Prerequisites
To use the IPsec feature, you need to perform the following tasks:
Obtain the ENTERPRISE_PKG license (see Chapter 10, Obtaining and Installing Licenses).
Configure IKE as described in the About IKE Initialization section on page 44-13.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The IPsec feature inserts new headers in existing packets (see the Configuring the MTU Frame Size
section on page 53-3 for more information).
Using IPsec
To use the IPsec feature, follow these steps:
Step 1 Obtain the ENTERPRISE_PKG license to enable IPSEC for iSCSI to enable IPsec for FCIP. See
Chapter 10, Obtaining and Installing Licenses.
Step 2 Configure IKE as described in the Manually Configuring IPsec and IKE section on page 44-13.
Note The IPsec feature inserts new headers in existing packets (see the Configuring the MTU Frame
Size section on page 53-3).
IPsec Compatibility
IPsec features are compatible with the following Cisco MDS 9000 Family hardware:
Cisco 18/4-port Multi-Service Module (MSM-18/4) modules and MDS 9222i Module-1 modules.
Cisco 14/2-port Multiprotocol Services (MPS-14/2) modules in Cisco MDS 9200 Switches or Cisco
MDS 9500 Directors
Cisco MDS 9216i Switch with the 14/2-port multiprotocol capability in the integrated supervisor
module. Refer to the Cisco MDS 9200 Series Hardware Installation Guide for more information on
the Cisco MDS 9216i Switch.
The IPsec feature is not supported on the management interface.
IPsec features are compatible with the following fabric setup:
Two connected Cisco MDS 9200 Switches or Cisco MDS 9500 Directors running Cisco MDS
SAN-OS Release 2.0(1b) or later, or Cisco NX-OS 4.1(1).
A Cisco MDS 9200 Switches or Cisco MDS 9500 Directors running Cisco MDS SAN-OS Release
2.0(1b) or later, or Cisco NX-OS 4.1(1) connected to any IPsec compliant device.
The following features are not supported in the Cisco NX-OS implementation of the IPsec feature:
Authentication Header (AH).
Transport mode.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Any reference to crypto maps in this document, only refers to static crypto maps.
Note The term tunnel mode is different from the term tunnel, which is used to indicate a secure
communication path between two peers, such as two switches connected by an FCIP link.
Anti-replayA security service where the receiver can reject old or duplicate packets to protect
itself against replay attacks. IPsec provides this optional service by use of a sequence number
combined with the use of data authentication.
Data authenticationData authentication can refer either to integrity alone or to both integrity and
authentication (data origin authentication is dependent on data integrity).
Data integrityVerifies that data has not been altered.
Data origin authenticationVerifies that the data was actually sent by the claimed sender.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Data confidentialityA security service where the protected data cannot be observed.
Data flowA grouping of traffic, identified by a combination of source address and mask or prefix,
destination address mask or prefix length, IP next protocol field, and source and destination ports,
where the protocol and port fields can have any of these values. Traffic matching a specific
combination of these values is logically grouped together into a data flow. A data flow can represent
a single TCP connection between two hosts, or it can represent traffic between two subnets. IPsec
protection is applied to data flows.
Perfect forward secrecy (PFS)A cryptographic characteristic associated with a derived shared
secret value. With PFS, if one key is compromised, previous and subsequent keys are not
compromised, because subsequent keys are not derived from previous keys.
Security Policy Database (SPD)An ordered list of policies applied to traffic. A policy decides if
a packet requires IPsec processing, if it should be allowed in clear text, or if it should be dropped.
The IPsec SPDs are derived from user configuration of crypto maps.
The IKE SPD is configured by the user.
Note Cisco NX-OS images with strong encryption are subject to United States government export
controls, and have a limited distribution. Images to be installed outside the United States require
an export license. Customer orders might be denied or subject to delay due to United States
government regulations. Contact your sales representative or distributor for more information,
or send e-mail to [email protected].
Message Digest 5 (MD5) is a hash algorithm with the HMAC variant. HMAC is a keyed hash variant
used to authenticate data.
Secure Hash Algorithm (SHA-1) is a hash algorithm with the Hash Message Authentication Code
(HMAC) variant.
AES-XCBC-MAC is a Message Authentication Code (MAC) using the AES algorithm.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Advanced Encrypted Standard (AES) is an encryption algorithm. It implements either 128 bits using
Cipher Block Chaining (CBC) or counter mode.
Data Encryption Standard (DES) is used to encrypt packet data and implements the mandatory
56-bit DES-CBC. CBC requires an initialization vector (IV) to start encryption. The IV is explicitly
given in the IPsec packet.
Triple DES (3DES) is a stronger form of DES with 168-bit encryption keys that allow sensitive
information to be transmitted over untrusted networks.
Note Cisco NX-OS images with strong encryption are subject to United States government export
controls, and have a limited distribution. Images to be installed outside the United States require
an export license. Customer orders might be denied or subject to delay due to United States
government regulations. Contact your sales representative or distributor for more information,
or send e-mail to [email protected].
Message Digest 5 (MD5) is a hash algorithm with the HMAC variant. HMAC is a keyed hash variant
used to authenticate data.
Secure Hash Algorithm (SHA-1) is a hash algorithm with the Hash Message Authentication Code
(HMAC) variant.
The switch authentication algorithm uses the preshared keys based on the IP address (see Setting
the Default RADIUS Server Timeout Interval and Retransmits section on page 41-9 for more
information on preshared keys).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 44-2 Two IPsec Switches Without CAs and Digital Certificates
Cleartext Cleartext
Encrypted data
144693
data data
Every time a new switch is added to the IPsec network, you must configure keys between the new switch
and each of the existing switches. (In Figure 44-3, four additional two-part key configurations are
required to add a single encrypting switch to the network.)
Consequently, the more devices that require IPsec services, the more involved the key administration
becomes. This approach does not scale well for larger, more complex encrypting networks.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
144695
Certificate
authority
To add a new IPsec switch to the network, you need only configure that new switch to request a
certificate from the CA, instead of making multiple key configurations with all the other existing IPsec
switches.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If the peer asks for a certificate which is signed by a CA that it trusts, then IKE uses that certificate,
if it exists on the switch, even if it is not the default certificate.
If the default certificate is deleted, the next IKE or general usage certificate, if any exists, is used by
IKE as the default certificate.
Certificate chaining is not supported by IKE.
IKE only sends the identity certificate, not the entire CA chain. For the certificate to be verified on
the peer, the same CA chain must also exist there.
Step 2 Choose the switches that act as endpoints for the FCIP link and click Next.
Note These switches must have MPS-14/2 modules installed to configure IPsec on this FCIP link.
Step 3 Choose the Gigabit Ethernet ports on each MPS-14/2 module that will form the FCIP link.
Step 4 Check the Enforce IPSEC Security check box and set IKE Auth Key (see Figure 44-6).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Click Next. In the Specify Tunnel Properties dialog, you see the TCP connection characteristics.
Step 6 Set the minimum and maximum bandwidth settings and round-trip time for the TCP connections on this
FCIP link. Click the Measure button to measure the round-trip time between the Gigabit Ethernet
endpoints.
Step 7 Check the Enable Write Acceleration check box to enable FCIP write acceleration on this FCIP link.
See the FCIP Write Acceleration section on page 48-29.
Step 8 Check the Enable Optimum Compression check box to enable IP compression on this FCIP link. See
the FCIP Compression section on page 48-37.
Step 9 Click Next to configure the FCIP tunnel parameters.
Step 10 Set the Port VSAN for nontrunk/auto and allowed VSAN list for the trunk tunnel. choose a Trunk Mode
for this FCIP link. See the Checking Trunk Status section on page 48-17.
Step 11 Click Finish to create this FCIP link or click Cancel to exit the FCIP Wizard without creating an FCIP
link.
To verify that IPsec and IKE are enabled using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select IPSEC in the Physical Attributes pane.
You see the IPsec configuration in the Information pane in Figure 44-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 The Control tab is the default. Verify that the switches you want to modify for IPSec are enabled in the
Status column.
Step 3 Expand Switches > Security and then select IKE in the Physical Attributes pane.
You see the IKE configuration in the Information pane shown in Figure 44-8.
Step 4 The Control tab is the default. Verify that the switches you want to modify for IKE are enabled in the
Status column.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Identify the peers for the traffic to which secure tunnels should be established.
Step 2 Configure the transform set with the required protocols and algorithms.
Step 3 Create the crypto map and apply access control lists (IPv4-ACLs), transform sets, peers, and lifetime
values as applicable.
Step 4 Apply the crypto map to the required interface.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IKE version 2 (IKEv2) is a simplified and more efficient version and does not interoperate with
IKEv1. IKEv2 is implemented using the draft-ietf-ipsec-ikev2-16.txt draft.
The following table lists the supported and verified settings for IPsec and IKE encryption authentication
algorithms on the Microsoft Windows and Linux platforms:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note When you configure the hash algorithm, the corresponding HMAC version is used as the authentication
algorithm.
When the IKE negotiation begins, IKE looks for an IKE policy that is the same on both peers. The peer
that initiates the negotiation will send all its policies to the remote peer, and the remote peer will try to
find a match. The remote peer looks for a match by comparing its own highest priority policy against the
other peer's received policies. The remote peer checks each of its policies in order of its priority (highest
priority first) until a match is found.
A match is found when the two peers have the same encryption, hash algorithm, authentication
algorithm, and DH group values. If a match is found, IKE completes the security negotiation and the
IPsec SAs are created.
If an acceptable match is not found, IKE refuses negotiation and the IPsec data flows will not be
established.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Enter the Priority for this switch. You can enter a value from one through 255, one being the highest.
Step 5 Select appropriate values for the encryption, hash, authentication, and DHGroup fields.
Step 6 Enter the lifetime for the policy. You can enter a lifetime from 600 to 86400 seconds.
Step 7 Click Create to create this policy, or click Close to discard any unsaved changes.
Note When the authentication method is rsa-sig, make sure the identity hostname is configured for IKE
because the IKE certificate has a subject name of the FQDN type.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Only IKE v1 is supported to build IPsec between 2.x and 3.x MDS switches.
Caution You may need to configure the initiator version even when the switch does not behave as an
IKE initiator under normal circumstances. Always using this option guarantees a faster
recovery of traffic flows in case of failures.
Tip The keepalive time only applies to IKEv2 peers and not to all peers.
Note When IPsec implementations in the host prefer to initiate the IPsec rekey, be sure to configure the IPsec
lifetime value in the Cisco MDS switch to be higher than the lifetime value in the host.
To configure the keepalive time for each peer using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Enter a value (in seconds) in the KeepAliveInterval (sec). the The keepalive interval in seconds is used
by the IKE entity on the managed device with all the peers for the DOI corresponding to this conceptual
row.
Step 4 Click Apply Changes to save your changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see the IKE configuration in the Information pane (see Figure 44-13).
Step 4 Select the Switches for the remote peer for which this IKE protocol initiator is configured.
Step 5 Enter the IP address of the remote peer.
IKEv1 represents the IKE protocol version used when connecting to a remote peer.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Click Create to create this initiator version or click Close to discard any unsaved changes.
Step 1 Expand Switches > Security and then select IKE in the Physical Attributes pane.
You see the IKE configuration in the Information pane (see Figure 44-15).
Refreshing SAs
To refresh the SAs after changing the IKEv2 configuration using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select IKE in the Physical Attributes pane.
You see the IKE configuration shown in Figure 44-16.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Crypto IPv4-ACLs
IP access control lists (IPv4-ACLs) provide basic network security to all switches in the Cisco MDS
9000 Family. IPv4 IP-ACLs restrict IP-related traffic based on the configured IP filters. See Chapter 42,
Configuring IPv4 and IPv6 Access Control Lists for details on creating and defining IPv4-ACLs.
In the context of crypto maps, IPv4-ACLs are different from regular IPv4-ACLs. Regular IPv4-ACLs
determine what traffic to forward or block at an interface. For example, IPv4-ACLs can be created to
protect all IP traffic between subnet A and subnet Y or Telnet traffic between host A and host B.
This section contains the following topics:
About Crypto IPv4-ACLs, page 44-22
Creating Crypto IPv4-ACLs, page 44-25
About Transform Sets in IPsec, page 44-25
Configuring Transform Sets, page 44-26
About Crypto Map Entries, page 44-28
Creating Crypto Map Entries, page 44-29
About SA Lifetime Negotiation, page 44-30
Setting the SA Lifetime, page 44-31
About the AutoPeer Option, page 44-32
Configuring the AutoPeer Option, page 44-33
About Perfect Forward Secrecy, page 44-34
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip If you want some traffic to receive one type of IPsec protection (for example, encryption only) and other
traffic to receive a different type of IPsec protection (for example, both authentication and encryption),
create two IPv4-ACLs. Use both IPv4-ACLs in different crypto maps to specify different IPsec policies.
Note IKE traffic (UDP port 500) is implicitly transmitted in clear text.
The IPsec feature only considers the source and destination IPv4 addresses and subnet masks,
protocol, and single port number. There is no support for IPv6 in IPsec.
Note The IPsec feature does not support port number ranges and ignores higher port number field,
if specified.
The permit option causes all IP traffic that matches the specified conditions to be protected by
crypto, using the policy described by the corresponding crypto map entry.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The deny option prevents traffic from being protected by crypto. The first deny statement causes the
traffic to be in clear text.
The crypto IPv4-ACL you define is applied to an interface after you define the corresponding crypto
map entry and apply the crypto map set to the interface.
Different IPv4-ACLs must be used in different entries of the same crypto map set.
Inbound and outbound traffic is evaluated against the same outbound IPv4-ACL. Therefore, the
IPv4-ACL's criteria is applied in the forward direction to traffic exiting your switch, and the reverse
direction to traffic entering your switch.
Each IPv4-ACL filter assigned to the crypto map entry is equivalent to one security policy entry. The
IPsec feature supports up to 120 security policy entries for each MPS-14/2 module and Cisco MDS
9216i Switch.
In Figure 44-17, IPsec protection is applied to traffic between switch interface S0 (IPv4 address
10.0.0.1) and switch interface S1 (IPv4 address 20.0.0.2) as the data exits switch A's S0 interface
enroute to switch interface S1. For traffic from 10.0.0.1 to 20.0.0.2, the IPv4-ACL entry on switch
A is evaluated as follows:
source = IPv4 address 10.0.0.1
dest = IPv4 address 20.0.0.2
For traffic from 20.0.0.2 to 10.0.0.1, that same IPv4-ACL entry on switch A is evaluated as follows:
source = IPv4 address 20.0.0.2
dest = IPv4 address 10.0.0.1
IPSec peers
MDS_Switch A MDS_Switch N
S0 Internet
S1
If you configure multiple statements for a given crypto IPv4-ACL that is used for IPsec, the first
permit statement that is matched is used to determine the scope of the IPsec SA. Later, if traffic
matches a different permit statement of the crypto IPv4-ACL, a new, separate IPsec SA is negotiated
to protect traffic matching the newly matched IPv4-ACL statement.
Unprotected inbound traffic that matches a permit entry in the crypto IPv4-ACL for a crypto map
entry flagged as IPsec is dropped, because this traffic was expected to be protected by IPsec.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
For IPsec to interoperate effectively with Microsoft iSCSI initiators, specify the TCP protocol and
the local iSCSI TCP port number (default 3260) in the IPv4-ACL. This configuration ensures the
speedy recovery of encrypted iSCSI sessions following disruptions such as Gigabit Ethernet
interfaces shutdowns, VRRP switchovers, and port failures.
Tip The crypto map entries themselves must also support common transforms and must refer to the other
system as a peer.
Figure 44-18 shows some sample scenarios with and without mirror image IPv4-ACLs.
Subnet Y
Host B
Subnet X
Switch M Router N
S0 Internet
S1 Host C
As Figure 44-18 indicates, IPsec SAs can be established as expected whenever the two peers' crypto
IPv4-ACLs are mirror images of each other. However, an IPsec SA can be established only some of the
time when the IPv4-ACLs are not mirror images of each other. This can happen in the case when an entry
in one peer's IPv4-ACL is a subset of an entry in the other peer's IPv4-ACL, such as shown in cases 3
and 4 of Figure 44-18. IPsec SA establishment is critical to IPsec. Without SAs, IPsec does not work,
causing any packets matching the crypto IPv4-ACL criteria to be silently dropped instead of being
forwarded with IPsec security.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In case 4, an SA cannot be established because SAs are always requested according to the crypto
IPv4-ACLs at the initiating packet's end. In case 4, router N requests that all traffic between subnet X
and subnet Y be protected, but this is a superset of the specific flows permitted by the crypto IPv4-ACL
at switch M so the request is not permitted. Case 3 works because switch M's request is a subset of the
specific flows permitted by the crypto IPv4-ACL at router N.
Because of the complexities introduced when crypto IPv4-ACLs are not configured as mirror images at
peer IPsec devices, we strongly encourage you to use mirror image crypto IPv4-ACLs.
Tip We recommend that you configure mirror image crypto IPv4-ACLs for use by IPsec and that you avoid
using the any option.
The any keyword in a permit statement is discouraged when you have multicast traffic flowing through
the IPsec interface. This configuration can cause multicast traffic to fail.
The permit any statement causes all outbound traffic to be protected (and all protected traffic sent to the
peer specified in the corresponding crypto map entry) and requires protection for all inbound traffic.
Then, all inbound packets that lack IPsec protection are silently dropped, including packets for routing
protocols, NTP, echo, echo response, and so forth.
You need to be sure you define which packets to protect. If you must use any in a permit statement, you
must preface that statement with a series of deny statements to filter out any traffic (that would otherwise
fall within that permit statement) that you do not want to be protected.
Tip If you change a transform set definition, the change is only applied to crypto map entries that reference
the transform set. The change is not applied to existing security associations, but used in subsequent
negotiations to establish new security associations. If you want the new settings to take effect sooner,
you can clear all or part of the security association database.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note When you enable IPsec, the Cisco NX-OS software automatically creates a default transform set
(ipsec_default_tranform_set) using AES-128 encryption and SHA-1 authentication algorithms.
The following table lists the supported and verified settings for IPsec and IKE encryption authentication
algorithms on the Microsoft Windows and Linux platforms:
Step 1 Expand Switches > Security and then select IPSec in the Physical Attributes pane.
You see the IPSec configuration shown in Figure 44-19.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select the switches that you want to create a transform set for in the Create Transform Set dialog box.
Step 5 Assign a name and protocol for the transform set.
Step 6 Select the encryption and authentication algorithm. See Table 44-2 to verify the allowed transform
combinations.
Step 7 Click Create to create the transform set or you click Close.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select IPSEC in the Physical Attributes pane.
You see the IPSec configuration in the Information pane (see Figure 44-21).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select the switch that you want to configure or modify. If you are creating a crypto map, set the setName
and priority for this crypto map.
Step 5 Select the IPv4-ACL Profile and TransformSetIdList from the drop-down list for this crypto map.
Step 6 (Optional) Check the AutoPeer check box or set the peer address if you are creating a crypto map. See
the About the AutoPeer Option section on page 44-32.
Step 7 Choose the appropriate PFS selection. See the About Perfect Forward Secrecy section on page 44-34.
Step 8 Supply the Lifetime and LifeSize. See the About SA Lifetime Negotiation section on page 44-30.
Step 9 Click Create if you are creating a crypto map, or click Apply Changes if you are modifying an existing
crypto map.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To specify SA lifetime negotiation values, you can optionally configure the lifetime value for a specified
crypto map. If you do, this value overrides the globally set values. If you do not specify the crypto map
specific lifetime, the global value (or global default) is used.
See the Global Lifetime Values section on page 44-37 for more information on global lifetime values.
Step 1 Expand Switches > Security and then select IPSEC in the Physical Attributes pane.
You see the IP SEC configuration in the Information pane (see Figure 44-24).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Double-click and modify the value in the Life Time(sec) column.
Step 5 Click Apply Changes to save your changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 44-27 iSCSI with End-to-End IPsec Using the auto-peer Option
Subnet X
Host 2
Host 1
iPSEC
MDS A
iPSEC iPSEC
Router
iPSEC
Host 3
120879
Configuring the AutoPeer Option
To configure the AutoPeer option using Fabric Manager, follow these steps:
Step 1 Expand Switches > Security and then select IPSEC in the Physical Attributes pane.
You see the IPsec configuration in the Information pane (see Figure 44-28).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Check or uncheck the AutoPeer option for the selected crypto map set entry.
Step 4 Click Apply Changes to save your changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select IPSEC in the Physical Attributes pane.
You see the IPsec configuration in the Information pane (see Figure 44-30).
Step 3 In the drop-down list in the PFS column select the appropriate value.
Step 4 Click Apply Changes to save your changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches > Security and then select IPSEC in the Physical Attributes pane.
You see the IPsec configuration in the Information pane (see Figure 44-32).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IPsec Maintenance
Certain configuration changes will only take effect when negotiating subsequent security associations.
If you want the new settings to take immediate effect, you must clear the existing security associations
so that they will be reestablished with the changed configuration. If the switch is actively processing
IPsec traffic, it is desirable to clear only the portion of the security association database that would be
affected by the configuration changes (that is, clear only the security associations established by a given
crypto map set). Clearing the full security association database should be reserved for large-scale
changes, or when the router is processing very little other IPsec traffic.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Assuming that the particular crypto map entry does not have lifetime values configured, when the switch
requests new SAs it will specify its global lifetime values in the request to the peer; it will use this value
as the lifetime of the new SAs. When the switch receives a negotiation request from the peer, it uses the
value determined by the IKE version in use:
If you use IKEv1 to set up IPsec SAs, the SA lifetime values are chosen to be the smaller of the two
proposals. The same values are programmed on both the ends of the tunnel.
If you use IKEv2 to set up IPsec SAs, the SAs on each end have their own set up of lifetime values
and thus the SAs on both sides expire independently.
The SA (and corresponding keys) will expire according to whichever comes sooner, either after the
specified amount of time (in seconds) has passed or after the specified amount of traffic (in bytes) has
passed.
A new SA is negotiated before the lifetime threshold of the existing SA is reached to ensure that
negotiation completes before the existing SA expires.
The new SA is negotiated when one of the following thresholds is reached (whichever comes first):
30 seconds before the lifetime expires or
Approximately 10% of the lifetime in bytes remain
If no traffic has passed through when the lifetime expires, a new SA is not negotiated. Instead, a new SA
will be negotiated only when IPsec sees another packet that should be protected.
To configure global SA lifetimes using Fabric Manager, follow these steps:
Step 1 Choose Switches > Security and then select IPSEC in the Physical Attributes pane.
Step 2 You see the IP Sec configuration in the Information pane.
Step 3 Click the Global tab.
Step 4 Double-click and edit the value in the Life Time(sec) column (see Figure 44-34).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 44-3 lists the default settings for IKE parameters.
Parameters Default
IKE Disabled.
IKE version IKE version 2.
IKE encryption algorithm 3DES.
IKE hash algorithm SHA.
IKE authentication method Not configurable (uses preshared keys).
IKE DH group identifier Group 1.
IKE lifetime association 86,400 00 seconds (equals 24 hours).
IKE keepalive time for each peer (v2) 3,600 seconds (equals 1 hour).
Parameters Default
IPsec Disabled.
Applying IPsec to the traffic. Denyallowing clear text.
IPsec PFS Disabled.
IPsec global lifetime (traffic-volume) 450 Gigabytes.
IPsec global lifetime (time) 3,600 seconds (one hour).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 45
Configuring FC-SP and DHCHAP
Fibre Channel Security Protocol (FC-SP) capabilities provide switch-switch and host-switch
authentication to overcome security challenges for enterprise-wide fabrics. Diffie-Hellman Challenge
Handshake Authentication Protocol (DHCHAP) is an FC-SP protocol that provides authentication
between Cisco MDS 9000 Family switches and other devices. DHCHAP consists of the CHAP protocol
combined with the Diffie-Hellman exchange.
This chapter includes the following sections:
About Fabric Authentication, page 45-1
DHCHAP, page 45-2
Default Settings, page 45-10
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Trusted hosts
RADIUS server
FC-SP
(DH-CHAP)
Unauthorized
hosts and switches
FC-SP
(DH-CHAP)
Storage
Subsytems
105209
DHCHAP
DHCHAP is an authentication protocol that authenticates the devices connecting to a switch. Fibre
Channel authentication allows only trusted devices to be added to a fabric, thus preventing unauthorized
devices from accessing the switch.
Note The terms FC-SP and DHCHAP are used interchangeably in this chapter.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Enabling DHCHAP
To enable DHCHAP for a Cisco MDS switch using Fabric Manager, follow these steps:
The Control tab is the default. You see the FC-SP enable state for all switches in the fabric.
Step 2 Set the Command drop-down menu to enable for all switches that you want to enable FC-SP on.
Step 3 Click the Apply Changes icon to enable FC-SP and DHCHAP on the selected switches.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Whenever DHCHAP port mode is changed to a mode other than the Off mode, reauthentication is
performed.
Table 45-1 identifies the switch-to-switch authentication behavior between two Cisco MDS switches in
various modes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Set the Mode drop-down menu to the DHCHAP authentication mode you want to configure for that
interface.
Step 4 Click the Apply Changes icon to save these DHCHAP port mode settings.
Tip If you change the hash algorithm configuration, then change it globally for all switches in the fabric.
Caution RADIUS and TACACS+ protocols always use MD5 for CHAP authentication. Using SHA-1 as the hash
algorithm may prevent RADIUS and TACACS+ usageeven if these AAA protocols are enabled for
DHCHAP authentication.
Step 3 Change the DHCHAP HashList for each switch in the fabric.
Step 4 Click the Apply Changes icocn to save the updated hash algorithm priority list.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip If you change the DH group configuration, change it globally for all switches in the fabric.
Note All passwords are restricted to 64 alphanumeric characters and can be changed, but not deleted.
Tip We recommend using RADIUS or TACACS+ for fabrics with more than five switches. If you need to
use a local password database, you can continue to do so using Approach 3 and using the Cisco MDS
9000 Family Fabric Manager to manage the password database.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The switch WWN identifies the physical switch. This WWN is used to authenticate the switch and is
different from the VSAN node WWN.
Step 1 Right-click an ISL and select Enable FC-SP from the drop-down list (see Figure 45-5).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Change the DHCHAP timeout value for each switch in the fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Click the Apply Changes icon to save the updated information.
Default Settings
Table 45-2 lists the default settings for all fabric security features in any switch.
Parameters Default
DHCHAP feature Disabled.
DHCHAP hash algorithm A priority list of MD5 followed by SHA-1 for DHCHAP
authentication.
DHCHAP authentication mode Auto-passive.
DHCHAP group default priority 0, 4, 1, 2, and 3 respectively.
exchange order
DHCHAP timeout value 30 seconds.
CH A P T E R 46
Configuring Port Security
All switches in the Cisco MDS 9000 Family provide port security features that reject intrusion attempts
and report these intrusions to the administrator.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
All intrusion attempts are reported to the SAN administrator through system messages.
Configuration distribution uses the CFS infrastructure, and is limited to those switches that are CFS
capable. Distribution is disabled by default.
Configuring the port security policy requires the ENTERPRISE_PKG license (see Chapter 10,
Obtaining and Installing Licenses).
This section includes the following topics:
Port Security Enforcement, page 46-2
About Auto-Learning, page 46-2
Port Security Activation, page 46-3
About Auto-Learning
You can instruct the switch to automatically learn (auto-learn) the port security configurations over a
specified period. This feature allows any switch in the Cisco MDS 9000 Family to automatically learn
about devices and switches that connect to it. Use this feature when you activate the port security feature
for the first time as it saves tedious manual configuration for each port. You must configure auto-learning
on a per-VSAN basis. If enabled, devices and switches that are allowed to connect to the switch are
automatically learned, even if you have not configured any port access.
When auto-learning is enabled, learning happens only for the devices or interfaces that were not already
logged into the switch. Learned entries on a port are cleaned up after you shut down that port if
auto-learning is still enabled.
Learning does not override the existing configured port security policies. So, for example, if an interface
is configured to allow a specific pWWN, then auto-learning will not add a new entry to allow any other
pWWN on that interface. All other pWWNs will be blocked even in auto-learning mode.
No entries are learned for a port in the shutdown state.
When you activate the port security feature, auto-learning is also automatically enabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you enable auto-learning before activating port security, you cannot activate until auto-learning is
disabled.
Tip If a port is shut down because of a denied login attempt, and you subsequently configure the database to
allow that login, the port does not come up automatically. You must explicitly issue a no shutdown CLI
command to bring that port back online.
Step 1 Enable port security. See the Enabling Port Security section on page 46-8.
Step 2 Enable CFS distribution. See the Enabling Distribution section on page 46-18.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Activate port security on each VSAN. This turns on auto-learning by default. See the Activating Port
Security section on page 46-9.
Step 4 Issue a CFS commit to copy this configuration to all switches in the fabric. See the Committing the
Changes section on page 46-19. At this point, all switches are activated, and auto-learning.
Step 5 Wait until all switches and all hosts are automatically learned.
Step 6 Disable auto-learn on each VSAN. See theDisabling Auto-learning section on page 46-13.
Step 7 Issue a CFS commit to copy this configuration to all switches in the fabric. See the Committing the
Changes section on page 46-19. At this point, the auto-learned entries from every switch are combined
into a static active database that is distributed to all switches.
Step 8 Copy the active database to the configure database on each VSAN. See the Port Security Database
Copy section on page 46-22.
Step 9 Issue a CFS commit to copy this configuration to all switches in the fabric. See the Committing the
Changes section on page 46-19. This ensures that the configure database is the same on all switches in
the fabric.
Step 10 Copy the running configuration to the startup configuration, using the fabric option. This saves the port
security configure database to the startup configuration on all switches in the fabric.
Step 1 Enable port security. See the Enabling Port Security section on page 46-8.
Step 2 Activate port security on each VSAN. This turns on auto-learning by default. See the Activating Port
Security section on page 46-9.
Step 3 Wait until all switches and all hosts are automatically learned.
Step 4 Disable auto-learn on each VSAN. See the Disabling Auto-learning section on page 46-13.
Step 5 Copy the active database to the configure database on each VSAN. See the Port Security Database
Copy section on page 46-22.
Step 6 Copy the running configuration to the startup configuration This saves the port security configure
database to the startup configuration.
Step 7 Repeat Step 1 through Step 6 for all switches in the fabric.
Step 1 Enable port security. See the Enabling Port Security section on page 46-8.
Step 2 Manually configure all port security entries into the configure database on each VSAN. See the Port
Security Manual Configuration section on page 46-15.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Activate port security on each VSAN. This turns on auto-learning by default. See the Activating Port
Security section on page 46-9.
Step 4 Disable auto-learn on each VSAN. See the Disabling Auto-learning section on page 46-13.
Step 5 Copy the running configuration to the startup configuration This saves the port security configure
database to the startup configuration.
Step 6 Repeat Step 1 through Step 5 for all switches in the fabric.
Prerequisites
The prerequisites for configuring Port Security are as follows:
Port Security enabled on the switch.
Port Security Policy should be defined either manually by editing bound devices or switches or ports
or by using autolearning.
Port Security Policy is activated.
Activated and configured databases are synchronized through copy.
Activated database is copied to be the startup configuration.
CFS should be enabled on all switches in the VSAN. A CFS master switch is selected to do all
configurations. All changes will be distributed to the VSAN through the CFS commit command.
To configure port security, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select the VSAN from the list and click OK.
You see the first page of the Port Security Setup Wizard as shown in Figure 46-2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see Edit and Activate Configuration page as shown in Figure 46-3.
Step 6 Two types of port binding can be created using the Insert Port Security Devices dialog box:
Port WWN-pWWN bound to an interface WWN.
Switch-Switch WWN bound to an interface. (Mainly useful for ISL binding.)
Step 7 Select the type of port binding by clicking the radio buttons and enter the supporting values.
Step 8 Click OK.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note To delete an entry in the Edit and Activate Configuration page of the wizard, select the entry and
click the Delete button.
Step 10 Click Finish to complete the Port Security Configuration for the selected switch.
Step 1 Expand a VSAN and then select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane (see Figure 46-5).
Step 3 Enable CFS on all participating switches in the VSAN by clicking each entry in the Global column and
selecting enable.
Step 4 Click Apply Changes to enable CFS distribution for the port security feature.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Set the Command column to enable for each switch in the VSAN.
Step 7 Click the CFS tab and set the Command column to commit on all participating switches in the VSAN.
Step 8 Click Apply Changes to distribute the enabled port security to all switches in the VSAN.
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane.
Step 2 Click the Actions tab.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click in the Action column under Activation, next to the switch or VSAN on which you want to activate
port security. You see a drop-down menu with the following options:
activateValid port security settings are activated.
activate (TurnLearningOff)Valid port security settings are activated and auto-learn turned off.
forceActivateActivation is forced.
forceActivate(TurnLearningOff)Activation is forced and auto-learn is turned off.
deactivateAll currently active port security settings are deactivated.
NoSelection No action is taken.
Step 4 Set the Action field you want for that switch.
Step 5 Uncheck the AutoLearn check box for each switch in the VSAN to disable auto-learning.
Step 6 Click the CFS tab and set the command column to commit on all participating switches in the VSAN.
Step 7 Click Apply Changes in Fabric Manager or Apply in Device Manager to save these changes.
Note If required, you can disable auto-learning (see the Disabling Auto-learning section on page 46-13).
Note An activation using the force option can log out existing devices if they violate the active database.
To forcefully activate the port security database using Fabric Manager, follow these steps:
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane.
Step 2 Click the Actions tab.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click in the Action column under Activation, next to the switch or VSAN on which you want to activate
port security and select the forceactivate option.
Step 4 Set the Action field you want for that switch.
Step 5 Click the CFS tab and set the command column to commit on all participating switches in the VSAN.
Step 6 Click Apply Changes in Fabric Manager or Apply in Device Manager to save these changes.
Database Reactivation
Tip If auto-learning is enabled, and you cannot activate the database, you will not be allowed to proceed. .
To reactivate the port security database using Fabric Manager, follow these steps:
Tip If the active database is empty, you cannot perform this step.
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane.
Step 2 Click the Actions tab.
You see the switches for that VSAN.
Step 3 Check the CopyActive ToConfig check box next to the switch for which you want to copy the database.
The active database is copied to the config database when the security setting is activated.
Step 4 Uncheck the CopyActive ToConfig check box if you do not want the database copied when the security
setting is activated.
Step 5 Click the CFS tab and set the command column to commit on all participating switches in the VSAN.
Step 6 Click Apply Changes to save these changes or click Undo Changes to discard any unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane.
Step 2 Click the Active Database tab.
You see the active port security settings for that VSAN.
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane.
Step 2 Click the Statistics tab.
You see the port security statistics for that VSAN.
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane.
Step 2 Click the Violations tab. You see the port security violations for that VSAN.
Auto-learning
This section contains the following topics:
About Enabling Auto-learning, page 46-13
Enabling Auto-learning, page 46-13
Disabling Auto-learning, page 46-13
Auto-Learning Device Authorization, page 46-14
Authorization Scenarios, page 46-14
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip If auto-learning is enabled on a VSAN, you can only activate the database for that VSAN by using the
force option.
Enabling Auto-learning
To enable auto-learning using Fabric Manager, follow these steps:
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane (see Figure 46-8).
Disabling Auto-learning
To disable auto-learning using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane (see Figure 46-8).
Step 2 Click the Actions tab.
You see the switches for that VSAN.
Step 3 Uncheck the AutoLearn check box next to the switch if you want to disable auto-learning.
Step 4 Click the Apply Changes icon to save these changes.
Authorization Scenarios
Assume that the port security feature is activated and the following conditions are specified in the active
database:
A pWWN (P1) is allowed access through interface fc1/1 (F1).
A pWWN (P2) is allowed access through interface fc1/1 (F1).
A nWWN (N1) is allowed access through interface fc1/2 (F2).
Any WWN is allowed access through interface fc1/3 (F3).
A nWWN (N3) is allowed access through any interface.
A pWWN (P3) is allowed access through interface fc1/4 (F4).
A sWWN (S1) is allowed access through interface fc1/10-13 (F10 to F13).
A pWWN (P10) is allowed access through interface fc1/11 (F11).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 46-2 summarizes the port security authorization results for this active database. The conditions
listed refer to the conditions from Table 46-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip Remote switch binding can be specified at the local switch. To specify the remote interfaces, you can
use either the fWWN or sWWN-interface combination.
To add authorized port pairs for port security using Fabric Manager, follow these steps:
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
Step 2 Click the Config Database tab.
Step 3 Click Create Row to add an authorized port pair.
You see the Create Port Security dialog box shown in Figure 46-9.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Double-click the device from the available list for which you want to create the port security setting.
Step 5 Double-click the port from the available list to which you want to bind the device.
Step 6 Click Create to create the port security setting.
Step 7 Click the Apply Changes icon to save these changes.
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
Step 2 Click the Config Database tab.
You see the configured port security settings for that VSAN.
Step 3 Click the row you want to delete.
Step 4 Click Delete Row.
You see the confirmation dialog box.
Step 5 Click Yes to delete the row, or click No to close the confirmation dialog box without deleting the row.
Step 6 Click the Apply Changes icon to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Enabling Distribution
All the configurations performed in distributed mode are stored in a pending (temporary) database. If
you modify the configuration, you need to commit or discard the pending database changes to the
configurations. The fabric remains locked during this period. Changes to the pending database are not
reflected in the configurations until you commit the changes.
Note Port activation or deactivation and auto-learning enable or disable do not take effect until after a CFS
commit if CFS distribution is enabled. Always follow any one of these operations with a CFS commit to
ensure proper configuration. See the Activation and Auto-learning Configuration Distribution section
on page 46-19.
Tip In this case, we recommend that you perform a commit at the end of each operation: after you activate
port security and after you enable auto learning.
Step 1 Expand a VSAN and select Port Security in the Logical Domains pane.
You see the port security configuration for that VSAN in the Information pane (see Figure 46-8).
Step 2 Click the Control tab.
You see the switches for that VSAN.
Step 3 In the Command column, select enable or disable from the drop-down menu.
Step 4 Click the Apply Changes icon to save the changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 46-3 Scenarios for Activation and Auto-learning Configurations in Distributed Mode
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 46-3 Scenarios for Activation and Auto-learning Configurations in Distributed Mode (continued)
Tip In this case, we recommend that you perform a commit at the end of each operation: after you activate
port security and after you enable auto learning.
Caution If you do not follow these two conditions, the merge will fail. The next distribution will forcefully
synchronize the databases and the activation states in the fabric.
Database Interaction
This section includes the following topics:
Database Scenarios, page 46-21
Port Security Database Copy, page 46-22
Port Security Database Deletion, page 46-22
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Database Scenarios
Figure 46-9 depicts various scenarios to depict the active database and the configuration database status
based on port security configurations.
Port Security Database Scenarios
Switch 1
Switch 1
config Database
config Database
<pwwn1, fwwn1>
<pwwn1, fwwn1> <pwwn2, fwwn2>
<pwwn2, fwwn2> Activating the
<pwwn3, fwwn3>
<pwwn3, fwwn3> database
CLI
active Database
active Database Note:
<pwwn1, fwwn1> Learned entries
<pwwn2, fwwn2> are saved in
EMPTY <pwwn3, fwwn3> the active
<pwwn4, fwwn4> database.
learned entires
<pwwn5, fwwn5>
Learning entries (pwwn4/5 already logged in)
Configuring authorized ports
Switch 1 Switch 1
Saving the configuration (copy running start) Copying active database to config database
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip We recommend that you copy the active database to the config database after disabling auto-learning.
This action will ensure that the configuration database is in sync with the active database. If distribution
is enabled, this command creates a temporary copy (and consequently a fabric lock) of the configuration
database. If you lock the fabric, you need to commit the changes to the configuration databases in all the
switches.
To copy the active database to the configuration database, using Fabric Manager, follow these steps:
Step 1 Expand a Fabric, expand a VSAN and then select Port Security in the Logical Domains pane.
Step 2 Click the Actions tab. You see all the configuration databases.
Step 3 Select the appropriate configuration database and check the Copy Active to Config checkbox.
Step 4 Click the Apply Changes icon to save your changes.
To view the differences between the active database and the configuration database using Fabric
Manager, follow these steps:
Step 1 Expand a Fabric, expand a VSAN and then select Port Security in the Logical Domains pane.
You see the Port Security information in the Information pane.
Step 2 Click the Database Differences tab. You see all the configuration databases.
Step 3 Select the appropriate configuration database. Select the Active or Config option to compare the
differences between the selected database and the active or configuration database.
Step 4 Click the Apply Changes icon to save your changes.
Tip If the distribution is enabled, the deletion creates a copy of the database. An explicit deletion is required
to actually delete the database.
To delete a port security database using Fabric Manager, follow these steps:
Step 1 Expand a Fabric, expand a VSAN and then select Port Security in the Logical Domains pane.
You see the Port Security information in the Information pane.
Step 2 Click the Config Database tab. You see all the configuration databases.
Step 3 Select the appropriate configuration database and click the Delete Row button.
Step 4 Click Yes if you want to delete the configuration database.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand a Fabric, expand a VSAN and then select Port Security in the Logical Domains pane.
You see the Port Security information in the Information pane (see Figure 46-8).
Step 2 Click the Statistics tab.
You see all the configuration databases.
Step 3 Select the appropriate configuration database and check the Clear option.
Step 4 Click the Apply Changes icon to save your changes.
To clear any learned entries in the active database for a specified interface within a VSAN using Fabric
Manager, follow these steps:
Step 1 Expand a Fabric, expand a VSAN and then select Port Security in the Logical Domains pane.
You see the Port Security information in the Information pane.
Step 2 Select the Actions tab. You see all the configuration databases.
Step 3 Select the appropriate configuration database and check the AutoLearn option.
Step 4 Click the Apply Changes icon to save your changes.
Note You can clear the Statistics and the AutoLearn option only for switches that are local and do not acquire
locks. Also, learned entries are only local to the switch and do not participate in distribution.
Default Settings
Table 46-5 lists the default settings for all port security features in any switch.
Parameters Default
Auto-learn Enabled if port security is enabled.
Port security Disabled.
Distribution Disabled.
Note Enabling distribution enables it on all VSANs in the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 47
Configuring Fabric Binding
This chapter describes the fabric binding feature provided in the Cisco MDS 9000 Family of directors
and switches. It includes the following sections:
About Fabric Binding, page 47-1
Fabric Binding Configuration, page 47-3
Default Settings, page 47-9
Licensing Requirements
Fabric binding requires that you install either the MAINFRAME_PKG license or the
ENTERPRISE_PKG license on your switch.
See Chapter 10, Obtaining and Installing Licenses, for more information on license feature support
and installation.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note All switches in a Fibre Channel VSAN using fabric binding must be running Cisco MDS SAN-OS
Release 3.0(1) and NX-OS 4.1(1b) or later.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Command Purpose
Step 1 switch# config t Enters configuration mode.
Step 2 switch(config)# feature fabric-binding Enables fabric binding on that switch.
switch(config)# no feature Disables (default) fabric binding on that switch.
fabric-binding
View the status of the fabric binding feature of a fabric binding-enabled switch by issuing the show
fabric-binding status command.
switch# show fabric-binding status
VSAN 1:Activated database
VSAN 4:No Active database
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To configure a list of sWWNs and domain IDs for a FICON VSAN, follow these steps:
Command Purpose
Step 1 switch# config t Enters configuration mode.
switch(config)#
Step 2 switch(config)# fabric-binding database vsan 5 Enters the fabric binding submode for the
switch(config-fabric-binding)# specified VSAN.
switch(config)# no fabric-binding database vsan Deletes the fabric binding database for the
5 specified VSAN.
Step 3 switch(config-fabric-binding)# swwn Adds the sWWN and domain ID of a switch
21:00:05:30:23:11:11:11 domain 102 to the configured database list.
switch(config-fabric-binding)# swwn Adds the sWWN and domain ID of another
21:00:05:30:23:1a:11:03 domain 101 switch to the configured database list.
switch(config-fabric-binding)# no swwn Deletes the sWWN and domain ID of a
21:00:15:30:23:1a:11:03 domain 101 switch from the configured database list.
Step 4 switch(config-fabric-binding)# exit Exits the fabric binding submode.
switch(config)#
To configure a list of sWWNs and optional domain IDs for a Fibre Channel VSAN, follow these steps:
Command Purpose
Step 1 switch# config t Enters configuration mode.
switch(config)#
Step 2 switch(config)# fabric-binding database vsan 10 Enters the fabric binding submode for the
switch(config-fabric-binding)# specified VSAN.
switch(config)# no fabric-binding database vsan Deletes the fabric binding database for the
10 specified VSAN.
Step 3 switch(config-fabric-binding)# swwn Adds the sWWN of a switch for all domains
21:00:05:30:23:11:11:11 to the configured database list.
switch(config-fabric-binding)# no swwn Deletes the sWWN of a switch for all
21:00:05:30:23:11:11:11 domains from the configured database list.
switch(config-fabric-binding)# swwn Adds the sWWN of another switch for a
21:00:05:30:23:1a:11:03 domain 101 specific domain ID to the configured
database list.
switch(config-fabric-binding)# no swwn Deletes the sWWN and domain ID of a
21:00:15:30:23:1a:11:03 domain 101 switch from the configured database list.
Step 4 switch(config-fabric-binding)# exit Exits the fabric binding submode.
switch(config)#
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
By default, the fabric binding feature is not activated. You cannot activate the fabric binding database on
the switch if entries existing in the configured database conflict with the current state of the fabric. For
example, one of the already logged in switches may be denied login by the config-database. You can
choose to forcefully override these situations.
Note After activation, any already logged in switch that violates the current active database will be logged out,
and all switches that were previously denied login because of fabric binding restrictions are reinitialized.
Command Purpose
Step 1 switch# config t Enters configuration mode.
switch(config)#
Step 2 switch(config)# fabric-binding activate vsan 10 Activates the fabric binding database for
the specified VSAN.
switch(config)# no fabric-binding activate vsan 10 Deactivates the fabric binding database for
the specified VSAN.
Command Purpose
Step 1 switch# config t Enters configuration mode.
switch(config)#
Step 2 switch(config)# fabric-binding activate vsan 3 force Activates the fabric binding database
for the specified VSAN
forcefullyeven if the configuration
is not acceptable.
switch(config)# no fabric-binding activate vsan 3 force Reverts to the previously configured
state or to the factory default (if no
state is configured).
Use the fabric-binding database copy vsan command to copy from the active database to the
config database. If the configured database is empty, this command is not accepted.
switch# fabric-binding database copy vsan 1
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Use the fabric-binding database diff active vsan command to view the differences between the
active database and the config database. This command can be used when resolving conflicts.
switch# fabric-binding database diff active vsan 1
Use the fabric-binding database diff config vsan command to obtain information on the
differences between the config database and the active database.
switch# fabric-binding database diff config vsan 1
Use the copy running-config startup-config command to save the running configuration to the
startup configuration so that the fabric binding config database is available after a reboot.
switch# copy running-config startup-config
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note In VSAN 3 the sWWN itself was not found in the list. In VSAN 2, the sWWN was found in the list, but
has a domain ID mismatch.
Default Settings
Table 47-2 lists the default settings for the fabric binding feature.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
Fabric binding Disabled.
PA R T 6
IP Services
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 48
Configuring FCIP
Cisco MDS 9000 Family IP storage (IPS) services extend the reach of Fibre Channel SANs by using
open-standard, IP-based technology. The switch can connect separated SAN islands using Fibre Channel
over IP (FCIP).
Note FCIP is specific to the IPS module and is available in Cisco MDS 9200 Switches or Cisco MDS 9500
Directors.
The Cisco MDS 9216I switch and the 14/2 Multiprotocol Services (MPS-14/2) module also allow you
to use Fibre Channel, FCIP, and iSCSI features. The MPS-14/2 module is available for use in any switch
in the Cisco MDS 9200 Series or Cisco MDS 9500 Series.
Note For information on configuring Gigabit Ethernet interfaces, see Chapter 53, Configuring IPv4 for
Gigabit Ethernet Interfaces.
About FCIP
The Fibre Channel over IP Protocol (FCIP) is a tunneling protocol that connects geographically
distributed Fibre Channel storage area networks (SAN islands) transparently over IP local area networks
(LANs), metropolitan area networks (MANs), and wide area networks (WANs). See Figure 48-1.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Virtual (E)ISL
Switch 1 Switch 2 Switch 3 Switch 4
WAN
Fibre Fibre
Channel Channel
91556
fabric IP router fabric
IP router
FCIP uses TCP as a network layer transport. The DF bit is set in the TCP header.
Note For more information about FCIP protocols, refer to the IETF standards for IP storage at
http://www.ietf.org. Also refer to Fibre Channel standards for switch backbone connection at
http://www.t11.org (see FC-BB-2).
FCIP Concepts
To configure IPS modules or MPS-14/2 modules for FCIP, you should have a basic understanding of the
following concepts:
FCIP and VE Ports, page 48-2
FCIP Links, page 48-3
FCIP Profiles, page 48-4
FCIP Interfaces, page 48-4
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switch A
FC Switch C
F
F FC
FC F
E IP
GE VE
FC F
FC
Switch B
FCIP link
VE GE
FC E
F Virtual ISL
FC
91557
See the Configuring E Ports section on page 48-28.
FCIP Links
FCIP links consist of one or more TCP connections between two FCIP link endpoints. Each link carries
encapsulated Fibre Channel frames.
When the FCIP link comes up, the VE ports at both ends of the FCIP link create a virtual Fibre Channel
(E)ISL and initiate the E port protocol to bring up the (E)ISL.
By default, the FCIP feature on any Cisco MDS 9000 Family switch creates two TCP connections for
each FCIP link:
One connection is used for data frames.
The other connection is used only for Fibre Channel control frames, that is, switch-to-switch
protocol frames (all Class F). This arrangement provides low latency for all control frames.
To enable FCIP on the IPS module or MPS-14/2 module, an FCIP profile and FCIP interface (interface
FCIP) must be configured.
The FCIP link is established between two peers, the VE port initialization behavior is identical to a
normal E port. This behavior is independent of the link being FCIP or pure Fibre Channel, and is based
on the E port discovery process (ELP, ESC).
Once the FCIP link is established, the VE port behavior is identical to E port behavior for all inter-switch
communication (including domain management, zones, and VSANs). At the Fibre Channel layer, all VE
and E port operations are identical.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FCIP Profiles
The FCIP profile contains information about the local IP address and TCP parameters. The profile
defines the following information:
The local connection points (IP address and TCP port number)
The behavior of the underlying TCP connections for all FCIP links that use this profile
The FCIP profiles local IP address determines the Gigabit Ethernet port where the FCIP links terminate
(see Figure 48-3).
Switch 2
Switch 1
Gigabit
Ethernet FCIP link 1
FCIP IP
interfaces network
Switch 4
FCIP
profile FCIP link 3
91558
FCIP Interfaces
The FCIP interface is the local endpoint of the FCIP link and a VE port interface. All the FCIP and E
port parameters are configured in context to the FCIP interface.
The FCIP parameters consist of the following:
The FCIP profile determines which Gigabit Ethernet port initiates the FCIP links and defines the
TCP connection behavior.
Peer information.
Number of TCP connections for the FCIP link.
E port parameterstrunking mode and trunk allowed VSAN list.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Ethernet
FCIP link switch
IP
FC fabric network FC fabric
Ethernet Ethernet
switch FCIP link switch
90857
PortChannel of
two FCIP links
The following characteristics set Fibre Channel PortChannel solutions apart from other solutions:
The entire bundle is one logical (E)ISL link.
All FCIP links in the PortChannel should be across the same two switches.
The Fibre Channel traffic is load balanced across the FCIP links in the PortChannel.
FSPF
Figure 48-5 displays a FPSF-based load balancing configuration example. This configuration requires
two IP addresses on each SAN island, and addresses IP and FCIP link failures.
FCIP link
IP
FC fabric network FC fabric 90858
The following characteristics set FSPF solutions apart from other solutions:
Each FCIP link is a separate (E)ISL.
The FCIP links can connect to different switches across two SAN islands.
The Fibre Channel traffic is load balanced across the FCIP link.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
VRRP
Figure 48-6 displays a Virtual Router Redundancy Protocol (VRRP)-based high availability FCIP
configuration example. This configuration requires at least two physical Gigabit Ethernet ports
connected to the Ethernet switch on the island where you need to implement high availability using
VRRP.
FCIP link
IP
FC fabric FC fabric
network
90859
IP interfaces are in VRRP group
The following characteristics set VRRP solutions apart from other solutions:
If the active VRRP port fails, the standby VRRP port takes over the VRRP IP address.
When the VRRP switchover happens, the FCIP link automatically disconnects and reconnects.
This configuration has only one FCIP (E)ISL link.
Ethernet PortChannels
Figure 48-7 displays an Ethernet PortChannel-based high- availability FCIP example. This solution
addresses the problem caused by individual Gigabit Ethernet link failures.
FCIP link
IP
FC fabric FC fabric
network
90860
The following characteristics set Ethernet PortChannel solutions apart from other solutions:
The Gigabit Ethernet link level redundancy ensures a transparent failover if one of the Gigabit
Ethernet links fails.
Two Gigabit Ethernet ports in one Ethernet PortChannel appear like one logical Gigabit Ethernet
link.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FCIP FCIP
TCP TCP
IP IP
Ethernet Ethernet
Ethernet PortChannel
94176
To configure Fibre Channel PortChannels, see Chapter 23, Configuring PortChannels. To configure
Ethernet PortChannels, see the Configuring High Availability section on page 17-1.
Configuring FCIP
This section describes how to configure FCIP and includes the following topics:
Enabling FCIP, page 48-8
Basic FCIP Configuration, page 48-15
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Enabling FCIP
To begin configuring the FCIP feature, you must explicitly enable FCIP on the required switches in the
fabric. By default, this feature is disabled in all switches in the Cisco MDS 9000 Family.
The configuration and verification operations for the FCIP feature are only available when FCIP is
enabled on a switch. When you disable this feature, all related configurations are automatically
discarded.
To use the FCIP feature, you need to obtain the SAN extension over IP package license
(SAN_EXTN_OVER_IP or SAN_EXTN_OVER_IP_IPS4) (see Chapter 10, Obtaining and Installing
Licenses).
To create and manage FCIP links with Fabric Manager, use the FCIP Wizard. Make sure that the the IP
services module is inserted in the required Cisco MDS 9000 Family switch, and that the Gigabit Ethernet
interfaces on these switches are connected and then the verify the connectivity. The procedures for
creating FCIP links using the FCIP Wizard are as follows:
Select the endpoints.
Choose the interfaces IP addresses.
Specify link attributes.
Optionally enable FCIP write acceleration or FCIP compression.
To create FCIP links using the FCIP Wizard, follow these steps:
Step 1 Click the FCIP Wizard icon in the Fabric Manager toolbar. See Figure 48-9.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Choose the switches that act as endpoints for the FCIP link and click Next.
Step 3 Choose the Gigabit Ethernet ports on each switch that will form the FCIP link.
Step 4 If both Gigabit Ethernet ports are part of MPS-14/2 modules, check the Enforce IPSEC Security check
box and set the IKE Auth Key, as shown in Figure 48-11. See the IPsec and IKE Terminology section
on page 44-5 for information on IPsec and IKE.
Check the Use Large MTU Size (Jumbo Frames) option to use jumbo size frames of 2300. Since Fibre
Channel frames are 2112, we recommended that you use this option. If you uncheck the box, the FCIP
Wizard does not set the MTU size, and the default value of 1500 is set.
Note In Cisco MDS 9000 SAN-OS, Release 3.0(3), by default the Use Large MTU Size (Jumbo
Frames) option is not selected.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 9 Check the Write Acceleration check box to enable FCIP write acceleration on this FCIP link.
See the FCIP Write Acceleration section on page 48-29.
Step 10 Check the Enable Optimum Compression check box to enable IP compression on this FCIP link.
See the FCIP Compression section on page 48-37.
Step 11 Click Next.
Step 12 Set the Port VSAN and click the Trunk Mode radio button for this FCIP link, (see Figure 48-14).
Note If FICON is enabled/FICON VSAN is present on both the switches, the Figure 48-26 is
displayed, otherwise Figure 48-25 is displayed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switch 1 Switch 2
IP router IP router
IP
Network
IP address of Gigabit Ethernet IP address of Gigabit Ethernet
interface 3/1 = 10.100.1.25 interface 3/1 = 10.1.1.1 91561
Step 1 Verify that you are connected to a switch that contains an IPS module.
Step 2 From Fabric Manager, choose Switches > ISLs > FCIP in the Physical Attributes pane. From Device
Manager, choose FCIP from the IP menu.
Step 3 Click the Create Row button in Fabric Manager or the Create button on Device Manager to add a new
profile.
Step 4 Enter the profile ID in the ProfileId field.
Step 5 Enter the IP address of the interface to which you want to bind the profile.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Modify the optional TCP parameters, if desired. Refer to Fabric Manager Online Help for explanations
of these fields.
Step 7 (Optional) Click the Tunnels tab and modify the remote IP address in the Remote IPAddress field for
the endpoint to which you want to link.
Step 8 Enter the optional parameters, if desired. See the Cisco MDS 9000 Family CLI Configuration Guide for
information on displaying FCIP profile information.
Step 9 Click Apply Changes icon to save these changes.
Endpoint Endpoint
Interface FCIP = 51 Interface FCIP = 52
Profile = 10 Profile = 20
Connecting switch (peer) = 10.1.1.1 Connecting switch (peer) = 10.100.1.25
Switch 1 Switch 2
Switch 1 Switch 2
IP router IP router
IP
network
91562
IP address of Gigabit Ethernet IP address of Gigabit Ethernet
interface 3/1 = 10.100.1.25 interface 3/1 = 10.1.1.1
Step 1 Make sure you are connected to a switch that contains an IPS module.
Step 2 Select FCIP from the Interface menu.
Step 3 Click the Interfaces tab if it is not already selected. You see the FCIP Interfaces dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Click the ELP tab if it is not already selected. You see the FCIP ELP dialog box.
Step 1 Make sure you are connected to a switch that contains an IPS module.
Step 2 Select FCIP from the IP menu.
Step 3 Click the Trunk Config tab if it is not already selected. You see the FCIP Trunk Config dialog box. This
shows the status of the interface.
Step 4 Click the Trunk Failures tab if it is not already selected. You see the FCIP Trunk Failures dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note When FCIP is sent over a WAN link, the default TCP settings may not be appropriate. In such cases, we
recommend that you tune the FCIP WAN link by modifying the TCP parameters (specifically bandwidth,
round-trip times, and CWM burst size).
You can control the minimum amount of time TCP waits before retransmitting. By default, this value is
200 milliseconds (msec).
Keepalive Timeout
You can configure the interval that the TCP connection uses to verify that the FCIP link is functioning.
This ensures that an FCIP link failure is detected quickly even when there is no traffic.
If the TCP connection is idle for more than the specified time, then keepalive timeout packets are sent
to ensure that the connection is active. The keepalive timeout feature can be used to tune the time taken
to detect FCIP link failures.
You can configure the first interval during which the connection is idle (the default is 60 seconds). When
the connection is idle for the configured interval, eight keepalive probes are sent at 1-second intervals.
If no response is received for these eight probes and the connection remains idle throughout, that FCIP
link is automatically closed.
Note Only the first interval (during which the connection is idle) can be changed.
Maximum Retransmissions
You can specify the maximum number of times a packet is retransmitted before TCP decides to close the
connection.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Path MTUs
Path MTU (PMTU) is the minimum MTU on the IP network between the two endpoints of the FCIP link.
PMTU discovery is a mechanism by which TCP learns of the PMTU dynamically and adjusts the
maximum TCP segment accordingly (RFC 1191).
By default, PMTU discovery is enabled on all switches with a timeout of 3600 seconds. If TCP reduces
the size of the maximum segment because of PMTU change, the reset-timeout specifies the time after
which TCP tries the original MTU.
Selective Acknowledgments
TCP may experience poor performance when multiple packets are lost within one window. With the
limited information available from cumulative acknowledgments, a TCP sender can only learn about a
single lost packet per round trip. A selective acknowledgment (SACK) mechanism helps overcome the
limitations of multiple lost packets during a TCP transmission.
The receiving TCP sends back SACK advertisements to the sender. The sender can then retransmit only
the missing data segments. By default, SACK is enabled on Cisco MDS 9000 Family switches.
Window Management
The optimal TCP window size is automatically calculated using the maximum bandwidth parameter, the
minimum available bandwidth parameter, and the dynamically measured round trip time (RTT).
Note The configured round-trip-time parameter determines the window scaling factor of the TCP
connection. This parameter is only an approximation. The measured RTT value overrides the round trip
time parameter for window management. If the configured round-trip-time is too small compared to
the measured RTT, then the link may not be fully utilized due to the window scaling factor being too
small.
The min-available-bandwidth parameter and the measured RTT together determine the threshold below
which TCP aggressively maintains a window size sufficient to transmit at minimum available bandwidth.
The max-bandwidth-mbps parameter and the measured RTT together determine the maximum window
size.
Note Set the maximum bandwidth to match the worst-case bandwidth available on the physical link, keeping
in mind other traffic that might be going across this link (for example, other FCIP tunnels, WAN
limitations)in other words, maximum bandwidth should be the total bandwidth minus all other traffic
going across that link.
Monitoring Congestion
By enabling the congestion window monitoring (CWM) parameter, you allow TCP to monitor
congestion after each idle period. The CWM parameter also determines the maximum burst size allowed
after an idle period. By default, this parameter is enabled and the default burst size is 50 KB.
The interaction of bandwidth parameters and CWM and the resulting TCP behavior is outlined as
follows:
If the average rate of the Fibre Channel traffic over the preceding RTT is less than the
min-available-bandwidth multiplied by the RTT, the entire burst is sent immediately at the
min-available-bandwidth rate, provided no TCP drops occur.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If the average rate of the Fibre Channel traffic is greater than min-available-bandwidth multiplied
by the RTT, but less than max-bandwidth multiplied by the RTT, then if the Fibre Channel traffic is
transmitted in burst sizes smaller than the configured CWM value the entire burst is sent
immediately by FCIP at the max-bandwidth rate.
If the average rate of the Fibre Channel traffic is larger than the min-available-bandwidth multiplied
by the RTT and the burst size is greater than the CWM value, then only a part of the burst is sent
immediately. The remainder is sent with the next RTT.
The software uses standard TCP rules to increase the window beyond the one required to maintain the
min-available-bandwidth to reach the max-bandwidth.
Tip We recommend that this feature remain enabled to realize optimal performance. Increasing the CWM
burst size can result in more packet drops in the IP network, impacting TCP performance. Only if the IP
network has sufficient buffering, try increasing the CWM burst size beyond the default to achieve lower
transmit latency.
Jitter is defined as a variation in the delay of received packets. At the sending side, packets are sent in a
continuous stream with the packets spaced evenly apart. Due to network congestion, improper queuing,
or configuration errors, this steady stream can become lumpy, or the delay between each packet can vary
instead of remaining constant.
You can configure the maximum estimated jitter in microseconds by the packet sender. The estimated
variation should not include network queuing delay. By default, this parameter is enabled in Cisco MDS
switches when IPS modules or MPS-14/2 modules are present.
The default value is 1000 microseconds for FCIP interfaces.
Buffer Size
You can define the required additional bufferingbeyond the normal send window size that TCP
allows before flow controlling the switchs egress path for the FCIP interface. The default FCIP buffer
size is 0 KB.
Note Use the default if the FCIP traffic is passing through a high throughput WAN link. If you have a
mismatch in speed between the Fibre Channel link and the WAN link, then time stamp errors occur in
the DMA bridge. In such a situation, you can avoid time stamp errors by increasing the buffer size.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Configuring Peers
To establish an FCIP link with the peer, you can use one of two options:
Peer IP addressConfigures both ends of the FCIP link. Optionally, you can also use the peer TCP
port along with the IP address.
Special framesConfigures one end of the FCIP link when security gateways are present in the IP
network. Optionally, you can also use the switch WWN (sWWN) and profile ID along with the IP
address.
Peer IP Address
The basic FCIP configuration uses the peers IP address to configure the peer information. You can also
specify the peers port number to configure the peer information. If you do not specify a port, the default
3225 port number is used to establish connection. You can specify an IPv4 address or an IPv6 address.
To assign the peer information based on the IPv4 address and port number using Fabric Manager, follow
these steps:
Step 1 Expand ISLs and select FCIP in the Physical Attributes pane.
You see the FCIP profiles and links in the Information pane.
To assign the peer information based on the IPv4 address and port number using Fabric Manager, follow
these steps:
Step 1 Expand ISLs and select FCIP in the Physical Attributes pane.
You see the FCIP profiles and links in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To assign the peer information based on the IPv6 address and port number using Fabric Manager, follow
these steps:
Step 1 From Fabric Manager, choose ISLs > FCIP from the Physical Attributes pane.
You see the FCIP profiles and links in the Information pane.
From Device manager, choose IP > FCIP.You see the FCIP dialog box.
Step 2 Click the Tunnels tab. You see the FCIP link information.
Step 3 Click the Create Row icon in Fabric Manager or the Create button in Device Manager.
You see the FCIP Tunnels dialog box.
Step 4 Set the ProfileID and TunnelID fields.
Step 5 Set the RemoteIPAddress and RemoteTCPPort fields for the peer IP address you are configuring.
Step 6 Check the PassiveMode check box if you do not want this end of the link to initiate a TCP connection.
Step 7 (Optional) Set the NumTCPCon field to the number of TCP connections from this FCIP link.
Step 8 (Optional) Check the Enable check box in the Time Stamp section and set the Tolerance field.
Step 9 (Optional) Set the other fields in this dialog box and click Create to create this FCIP link.
To assign the peer information based on the IPv6 address and port number using Fabric Manager, follow
these steps:
Step 1 From Fabric Manager, choose ISLs > FCIP from the Physical Attributes pane.
You see the FCIP profiles and links in the Information pane.
From Device manager, choose IP > FCIP.You see the FCIP dialog box.
Step 2 Click the Tunnels tab. You see the FCIP link information.
Step 3 Click the Create Row icon in Fabric Manager or the Create button in Device Manager.
You see the FCIP Tunnels dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Special Frames
You can alternatively establish an FCIP link with a peer using an optional protocol called special frames.
When special frames are enabled, the peer IP address (and optionally the port or the profile ID) only
needs to be configured on one end of the link. Once the connection is established, a special frame is
exchanged to discover and authenticate the link.
By default, the special frame feature is disabled. You must enable special frames on the interfaces on
both peers to establish the FCIP link.
Note Refer to the Fibre Channel IP standards for further information on special frames.
Tip Special frame negotiation provides an additional authentication security mechanism because the link
validates the WWN of the peer switch.
Step 1 From Fabric Manager, choose ISLs > FCIP from the Physical Attributes pane.
You see the FCIP profiles and links in the Information pane.
From Device manager, choose IP > FCIP. You see the FCIP dialog box.
Step 2 Click the Tunnels tab. You see the FCIP link information.
Step 3 Click the Create Row icon in Fabric Manager or the Create button in Device Manager.
You see the FCIP Tunnels dialog box.
Step 4 Set the ProfileID and TunnelID fields.
Step 5 Set the RemoteIPAddress and RemoteTCPPort fields for the peer IP address you are configuring.
Step 6 Check the PassiveMode check box if you do not want this end of the link to initiate a TCP connection.
Step 7 (Optional) Set the NumTCPCon field to the number of TCP connections from this FCIP link.
Step 8 Check the Enable check box in the Special Frames section of the dialog box and set the RemoteWWN
and the RemoteProfileID fields.
Step 9 (Optional) Set the other fields in this dialog box and click Create to create this FCIP link.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Active Connections
You can configure the required mode for initiating a TCP connection. By default, active mode is enabled
to actively attempt an IP connection. If you enable the passive mode, the switch does not initiate a TCP
connection rather waits for the peer to connect to it.
Note Ensure that both ends of the FCIP link are not configured as passive mode. If both ends are configured
as passive, the connection is not initiated.
Tip Do not enable time stamp control on an FCIP interface that has tape acceleration or write acceleration
configured.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
E port
Switch A
F FC Switch C
FC F
F FC
F IP
GE VE
FC E
FC
B port FC bridge
B FC
Switch A B
access
F FC
FCIP link
FC F
FC bridge
E
Switch C
FC B
FC B access IP
F FC
FC E
Switch B E
B access ISL
FC
E FC
FC E ISL
F
ISL
91559
FC
B ports bridge Fibre Channel traffic from a local E port to a remote E port without participating in
fabric-related activities such as principal switch election, domain ID assignment, and Fibre Channel
fabric shortest path first (FSPF) routing. For example, Class F traffic entering a SAN extender does not
interact with the B port. The traffic is transparently propagated (bridged) over a WAN interface before
exiting the remote B port. This bridge results in both E ports exchanging Class F information that
ultimately leads to normal ISL behavior such as fabric merging and routing.
FCIP links between B port SAN extenders do not exchange the same information as FCIP links between
E ports, and are therefore incompatible. This is reflected by the terminology used in FC-BB-2: while VE
ports establish a virtual ISL over an FCIP link, B ports use a B access ISL.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The IPS module and MPS-14/2 module support FCIP links that originate from a B port SAN extender
device by implementing the B access ISL protocol on a Gigabit Ethernet interface. Internally, the
corresponding virtual B port connects to a virtual E port that completes the end-to-end E port
connectivity requirement (see Figure 48-21).
F FC
Fibre Channel
FC F port adapter (1G)
E
B B
access FC
FC IP
F FC
FC bridge
FC E
B
VE B access GE E
FC
ISL
FC E B access ISL
E
91560
FC
FCIP interface
The B port feature in the IPS module and MPS-14/2 module allows remote B port SAN extenders to
communicate directly with a Cisco MDS 9000 Family switch, eliminating the need for local bridge
devices.
Configuring B Ports
When an FCIP peer is a SAN extender device that only supports Fibre Channel B ports, you need to
enable the B port mode for the FCIP link. When a B port is enabled, the E port functionality is also
enabled and they coexist. If the B port is disabled, the E port functionality remains enabled.
To enable B port mode using Fabric Manager, follow these steps:
Step 1 Choose ISLs > FCIP from the Physical Attributes pane.
You see the FCIP profiles and links in the Information pane.
From Device manager, choose IP > FCIP. You see the FCIP dialog box.
Step 2 Click the Tunnels tab.
You see the FCIP link information.
Step 3 Click the Create Row icon in Fabric Manager or the Create button in Device Manager.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose ISLs > FCIP from the Physical Attributes pane.
You see the FCIP profiles and links in the Information pane.
From Device manager, choose IP > FCIP. You see the FCIP dialog box.
Step 2 Click the Tunnels tab.
You see the FCIP link information.
Step 3 Click the Create Row icon in Fabric Manager or the Create button in Device Manager.
You see the FCIP Tunnels dialog box.
Step 4 Set the ProfileID and TunnelID fields.
Step 5 Set the RemoteIPAddress and RemoteTCPPort fields for the peer IP address you are configuring.
Step 6 Check the PassiveMode check box if you do not want this end of the link to initiate a TCP connection.
Step 7 (Optional) Set the NumTCPCon field to the number of TCP connections from this FCIP link.
Step 8 Check the Enable check box in the B Port section of the dialog box and optionally check the KeepAlive
check box if you want a response sent to an ELS Echo frame received from the FCIP peer.
Step 9 (Optional) Set the other fields in this dialog box and click Create to create this FCIP link.
Quality of Service
The quality of service (QoS) parameter specifies the differentiated services code point (DSCP) value to
mark all IP packets (type of serviceTOS field in the IP header).
The control DSCP value applies to all FCIP frames in the control TCP connection.
The data DSCP value applies to all FCIP frames in the data connection.
If the FCIP link has only one TCP connection, that data DSCP value is applied to all packets in that
connection.
Configuring E Ports
You can configure E ports in the same way you configure FCIP interfaces. The following features are
also available for FCIP interfaces:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
An FCIP interface can be a member of any VSAN (see Chapter 26, Configuring and Managing
VSANs).
Trunk mode and trunk allowed VSANs (see Chapter 24, Configuring Trunking).
PortChannels (see Chapter 46, Configuring Port Security):
Multiple FCIP links can be bundled into a Fibre Channel PortChannel.
FCIP links and Fibre Channel links cannot be combined in one PortChannel.
FSPF (see Chapter 32, Configuring Fibre Channel Routing Services and Protocols).
Fibre Channel domains (fcdomains) (see Chapter 25, Configuring Domain Parameters.).
Importing and exporting the zone database from the adjacent switch (see Chapter 30, Configuring
and Managing Zones).
The FCIP write acceleration feature enables you to significantly improve application write performance
when storage traffic is routed over wide area networks using FCIP. When FCIP write acceleration is
enabled, WAN throughput is maximized by minimizing the impact of WAN latency for write operations.
Note The write acceleration feature is disabled by default and must be enabled on both sides of the FCIP link.
If it is only enabled on one side of the FCIP tunnel the write acceleration feature will be turned
operationally off.
In Figure 48-22, the WRITE command without write acceleration requires two round trip transfers
(RTT), while the WRITE command with write acceleration only requires one RTT. The maximum sized
Transfer Ready is sent from the host side of the FCIP link back to the host before the WRITE command
reaches the target. This enables the host to start sending the write data without waiting for the long
latency over the FCIP link of the WRITE command and Transfer Ready. It also eliminates the delay
caused by multiple Transfer Readys needed for the exchange going over the FCIP link.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FC
FCIP over
WAN
Command
RTT1
Transfer ready
Without
Data transfer acceleration
RT2
Status
FC
FCIP over
WAN
Command
Transfer ready
Data transfer
Transfer ready
RTT1 With
acceleration
Status
105224
Tip FCIP write acceleration can be enabled for multiple FCIP tunnels if the tunnels are part of a dynamic
PortChannel configured with channel mode active. FCIP write acceleration does not work if multiple
non-PortChannel ISLs exist with equal weight between the initiator and the target port. Such a
configuration might cause either SCSI discovery failure or failed WRITE or READ operations.
Tip Do not enable time stamp control on an FCIP interface with write acceleration configured.
Note Write acceleration cannot be used across FSPF equal cost paths in FCIP deployments. Native Fibre
Channel write acceleration can be used with Port Channels. Also, FCIP write acceleration can be used
in Port Channels configured with channel mode active or constructed with Port Channel Protocol (PCP).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution FCIP write acceleration with FCIP ports as members of PortChannels in Cisco MDS SAN-OS Release
2.0(1b) and later NX-OS are incompatible with the FCIP write acceleration in earlier releases.
Step 1 Choose ISLs > FCIP from the Physical Attributes pane on Fabric Manager.
You see the FCIP profiles and links in the Information pane.
On Device manager, choose IP > FCIP.
You see the FCIP dialog box.
Step 2 Click the Tunnels (Advanced) tab.
You see the FICP link information (see Figure 48-23).
Step 1 Choose ISLs > FCIP from the Physical Attributes pane on Fabric Manager.
You see the FCIP profiles and links in the Information pane.
On Device manager, choose IP > FCIP.
You see the FCIP dialog box.
Step 2 Click the Tunnels (Advanced) tab.
You see the FICP link information (see Figure 48-23).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Status 1 Status 1
120492
At the tape end of the FCIP tunnel, another Cisco MDS switch buffers the command and data it has
received. It then acts as a backup server to the tape drive by listening to a transfer ready from the tape
drive before forwarding the data.
Note In some cases such as a quick link up/down event (FCIP link, Server/Tape Port link) in a tape
library environment that exports Control LUN or a Medium Changer as LUN 0 and tape drives
as other LUNs, tape acceleration may not detect the tape sessions and may not accelerate these
sessions. The workaround is to keep the FCIP link disabled for a couple of minutes before
enabling the link. Note that this does not apply to tape environments where the tape drives are
either direct FC attached or exported as LUN 0.
The Cisco NX-OS provides reliable data delivery to the remote tape drives using TCP/IP over the WAN.
It maintains write data integrity by allowing the WRITE FILEMARKS operation to complete end-to-end
without proxying. The WRITE FILEMARKS operation signals the synchronization of the buffer data
with the tape library data. While tape media errors are returned to backup servers for error handling, tape
busy errors are retried automatically by the Cisco NX-OS software.
In an example of tape acceleration for read operations, the restore server in Figure 48-26 issues read
operations to a drive in the tape library. During the restore process, the remote Cisco MDS switch at the
tape end, in anticipation of more SCSI read operations from the host, sends out SCSI read operations on
its own to the tape drive. The prefetched read data is cached at the local Cisco MDS switch. The local
Cisco MDS switch on receiving SCSI read operations from the host, sends out the cached data. This
method results in more data being sent over the FCIP tunnel in the same time period compared to the
time taken to send data without read acceleration for tapes. This improves the performance for tape reads
on WAN links.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Read command N
Read data N Read data N
Status N Status N
Read command N Read command N+1
Read data N Read data N+1
Status N Status N+1 Status N+1
Status N+1
144886
The Cisco NX-OS provides reliable data delivery to the restore application using TCP/IP over the WAN.
While tape media errors during the read operation are returned to the restore server for error handling,
the Cisco NX-OS software recovers from any other errors.
Note The FCIP tape acceleration feature is disabled by default and must be enabled on both sides of the FCIP
link. If it is only enabled on one side of the FCIP tunnel, the tape acceleration feature is turned
operationally off.
Tip FCIP tape acceleration does not work if the FCIP port is part of a PortChannel or if there are multiple
paths between the initiator and the target port. Such a configuration might cause either SCSI discovery
failure or broken write or read operations.
Caution When tape acceleration is enabled in an FCIP interface, a FICON VSAN cannot be enabled in that
interface. Likewise, if an FCIP interface is up in a FICON VSAN, tape acceleration cannot be enabled
on that interface.
Note When you enable the tape acceleration feature for an FCIP tunnel, the tunnel is reinitialized and the write
and read acceleration feature is also automatically enabled.
In tape acceleration for writes, after a certain amount of data has been buffered at the remote Cisco MDS
switch, the write operations from the host are flow controlled by the local Cisco MDS switch by not
proxying the Transfer Ready. On completion of a write operation when some data buffers are freed, the
local Cisco MDS switch resumes the proxying. Likewise, in tape acceleration for reads, after a certain
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
amount of data has been buffered at the local Cisco MDS switch, the read operations to the tape drive
are flow controlled by the remote Cisco MDS switch by not issuing any further reads. On completion of
a read operation, when some data buffers are freed, the remote Cisco MDS switch resumes issuing reads.
The default flow control buffering uses the automatic option. This option takes the WAN latencies and
the speed of the tape into account to provide optimum performance. You can also specify a flow control
buffer size (the maximum buffer size is 12 MB).
Tip We recommend that you use the default option for flow-control buffering.
Tip Do not enable time-stamp control on an FCIP interface with tape acceleration configured.
Note If one end of the FCIP tunnel is running Cisco MDS SAN-OS Release 3.0(1) or later and NX-OS, and
the other end is running Cisco MDS SAN-OS Release 2.x, and tape acceleration is enabled, then the
FCIP tunnel will run only tape write acceleration, not tape-read acceleration.
If a tape library provides logical unit (LU) mapping and FCIP tape acceleration is enabled, you must
assign a unique LU number (LUN) to each physical tape drive accessible through a target port.
Figure 48-27 shows tape drives connected to Switch 2 through a single target port. If the tape library
provides LUN mapping, then all the four tape drives should be assign unique LUNs.
Tape library
Host 1
FCIP link
Drive 1
Switch 1 Switch 2
Drive 2
Host 2
Drive 3
Drive 4
180106
For the mappings described in Table 48-1 and Table 48-2, Host 1 has access to Drive 1 and Drive 2, and
Host 2 has access to Drive 3 and Drive 4.
Table 48-1 describes correct tape library LUN mapping.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 48-1 Correct LUN Mapping Example with Single Host Access
Table 48-2 Incorrect LUN Mapping Example with Single Hosts Access
Another example setup is when a tape drive is shared by multiple hosts through a single tape port. For
instance, Host 1 has access to Drive1 and Drive2, and Host 2 has access to Drive 2, Drive 3, and Drive
4. A correct LUN mapping configuration for such a setup is shown in Table 48-3.
Table 48-3 Correct LUN Mapping Example with Multiple Host Access
Step 1 From Fabric Manager, choose ISLs > FCIP from the Physical Attributes pane.
You see the FCIP profiles and links in the Information pane.
From Device Manager, choose IP > FCIP.
You see the FCIP dialog box.
Step 2 Click the Tunnels tab. You see the FICP link information.
Step 3 Click the Create Row icon in Fabric Manager or the Create button in Device Manager.
You see the FCIP Tunnels dialog box.
Step 4 Set the profile ID in the ProfileID field and the tunnel ID in the TunnelID fields.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Set the RemoteIPAddress and RemoteTCPPort fields for the peer IP address you are configuring.
Step 6 Check the TapeAccelerator check box.
Step 7 (Optional) Set the other fields in this dialog box and click Create to create this FCIP link.
To enable FCIP tape acceleration using Fabric Manager, follow these steps:
Step 1 From Fabric Manager, choose ISLs > FCIP from the Physical Attributes pane.
You see the FCIP profiles and links in the Information pane.
From Device Manager, choose IP > FCIP.
You see the FCIP dialog box.
Step 2 Click the Tunnels tab. You see the FICP link information.
Step 3 Click the Create Row icon in Fabric Manager or the Create button in Device Manager.
You see the FCIP Tunnels dialog box.
Step 4 Set the profile ID in the ProfileID field and the tunnel ID in the TunnelID fields.
Step 5 Set the RemoteIPAddress and RemoteTCPPort fields for the peer IP address you are configuring.
Step 6 Check the TapeAccelerator check box.
Step 7 (Optional) Set the other fields in this dialog box and click Create to create this FCIP link.
FCIP Compression
The FCIP compression feature allows IP packets to be compressed on the FCIP link if this feature is
enabled on that link. By default the FCIP compression is disabled. When enabled, the software defaults
to using the auto mode (if a mode is not specified).
Note The "auto" mode (default) selects the appropriate compression scheme based on the card type and
bandwidth of the link (the bandwidth of the link configured in the FCIP profiles TCP parameters).
Note With SAN-OS 3.3(1) and later NX-OS, all compression options (auto, mode1, mode2, mode3) mean
hardware deflate on 9222i and MSM 18+4. There is no software compression.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 48-5 lists the performance settings for different cards.
Table 48-5 Performance Settings
Note The Cisco MDS 9216i and 9222i Switches also supports the IP compression feature. The integrated
supervisor module has the same hardware components that are available in the MPS-14/2 module.
Caution The compression modes in Cisco SAN-OS Release 2.0(1b) and later and NX-OS are incompatible with
the compression modes in Cisco SAN-OS Release 1.3(1) and earlier.
Tip While upgrading from Cisco SAN-OS Release 1.x to Cisco SAN-OS Release 2.0(1b) or later and
NX-OS, we recommend that you disable compression before the upgrade procedure, and then enable the
required mode after the upgrade procedure.
If both ends of the FCIP link are running Cisco SAN-OS Release 2.0(1b) or later and NX-OS and you
enable compression at one end of the FCIP tunnel, be sure to enable it at the other end of the link.
Default Settings
Table 48-6 lists the default settings for FCIP parameters.
Parameters Default
TCP default port for FCIP 3225
minimum-retransmit-time 200 msec
Keepalive timeout 60 sec
Maximum retransmissions 4 retransmissions
PMTU discovery Enabled
pmtu-enable reset-timeout 3600 sec
SACK Enabled
max-bandwidth 1 Gbps
min-available-bandwidth 500 Mbps
round-trip-time 1 msec
Buffer size 0 KB
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
Control TCP and data connection No packets are transmitted
TCP congestion window monitoring Enabled
Burst size 50 KB
TCP connection mode Active mode is enabled
special-frame Disabled
FCIP timestamp Disabled
acceptable-diff range to accept packets +/ 2000 msec
B port keepalive responses Disabled
Write acceleration Disabled
Tape acceleration Disabled
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 49
Configuring the SAN Extension Tuner
The SAN Extension Tuner (SET) feature is unique to the Cisco MDS 9000 Family of switches. This
feature helps you optimize FCIP performance by generating either direct access (magnetic disk) or
sequential access (magnetic tape) SCSI I/O commands and directing such traffic to a specific virtual
target. You can specify the size of the test I/O transfers and how many concurrent or serial I/Os to
generate while testing. The SET reports the resulting I/Os per second (IOPS) and I/O latency, which
helps you determine the number of concurrent I/Os needed to maximize FCIP throughput.
This chapter includes the following sections:
About the SAN Extension Tuner, page 49-1
License Prerequisites, page 49-3
Configuring the SAN Extension Tuner, page 49-3
Using the SAN Extension Tuner Wizard, page 49-4
Default Settings, page 49-7
Note As of Cisco MDS SAN-OS Release 3.3(1a), SAN Extension Tuner is supported on the Multiservice
Module (MSM) and the Multiservice Modular Switch.
Applications such as remote copy and data backup use FCIP over an IP network to connect across
geographically distributed SANs. To achieve maximum throughput performance across the fabric, you
can tune the following configuration parameters:
The TCP parameters for the FCIP profile (see the Window Management section on page 48-20).
The number of concurrent SCSI I/Os generated by the application.
The transfer size used by the application over an FCIP link.
SET is implemented in IPS ports. When enabled, this feature can be used to generate SCSI I/O
commands (read and write) to the virtual target based on your configured options (see Figure 49-1).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FC
Read/Write I/O
WAN/MAN
IPS IPS
120493
fabric fabric
The SET feature assists with tuning by generating varying SCSI traffic workloads. It also measures
throughput and response time per I/ O over an FCIP link.
Before tuning the SAN fabric, be aware of the following guidelines:
Following these implementation details:
The tuned configuration is not persistent.
The virtual N ports created do not register FC4 features supported with the name server. This is
to avoid the hosts in the SAN from discovering these N ports as regular initiators or targets.
Login requests from other initiators in the SAN are rejected.
The virtual N ports do not implement the entire SCSI suite; it only implements the SCSI read
and write commands.
Tuner initiators can only communicate with tuner targets.
Verify that the Gigabit Ethernet interface is up at the physical layer (GBIC and Cable connectedan
IP address is not required).
Enable iSCSI on the switch (no other iSCSI configuration is required).
Enable the interface (no other iSCSI interface configuration is required) (see the Creating iSCSI
Interfaces section on page 50-5).
Configure the virtual N ports in a separate VSAN or zone as required by your network.
Be aware that a separate VSAN with only virtual N ports is not required, but is recommended as
some legacy HBAs may fail if logins to targets are rejected.
Do not use same Gigabit Ethernet interface to configure virtual N ports and FCIP linksuse
different Gigabit Ethernet interfaces. While this is not a requirement, it is recommended as the
traffic generated by the virtual N ports may interfere with the performance of the FCIP link.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
WAN or MAN
FCIP FCIP
link link
120494
N port N port
(Acts as initiator) (Acts as target)
Figure 49-3 provides a sample logical setup in which the virtual N ports are created on ports that are not
a part of the FCIP link for which the throughput and latency is measured.
GE 3/3 GE 2/3
FCIP
120495
link
Data Pattern
By default, an all-zero pattern is used as the pattern for data generated by the virtual N ports. You can
optionally specify a file as the data pattern to be generated by selecting a data pattern file from one of
three locations: the bootflash: directory, the volatile: directory, or the slot0: directory. This option is
especially useful when testing compression over FCIP links. You can also use Canterbury corpus or
artificial corpus files for benchmarking purposes.
License Prerequisites
To use the SET, you need to obtain the SAN_EXTN_OVER_IP license (see Chapter 10, Obtaining and
Installing Licenses).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Configure the nWWN for the virtual N ports on the switch.
Step 2 Enable iSCSI on the interfaces on which you want to create the N ports.
Step 3 Configure the virtual N ports on either side of the FCIP link.
Step 4 Ensure that the virtual N ports are not visible to real initiators in the SAN. You can use zoning (see
Chapter 30, Configuring and Managing Zones) or VSANs (see Chapter 26, Configuring and
Managing VSANs) to segregate the real initiators. Ensure that the zoning configuration is setup to allow
the virtual N-ports to communicate with each other.
Step 5 Start the SCSI read and write I/Os.
Step 6 Add more N ports (as required) to other Gigabit Ethernet ports in the switch to obtain maximum
throughput. One scenario that may require additional N ports is if you use FCIP PortChannels.
Step 1 Right-click a valid FCIP link in the Fabric pane, and then select SAN Extension Tuner from the
drop-down list. You can also highlight the link and choose Tools > Other > SAN Extension Tuner.
You see the Select Ethernet Port Pair dialog box (see Figure 49-4).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select the Ethernet port pairs that correspond to the FCIP link you want to tune and click Next.
You see the Specify Parameters dialog box (see Figure 49-5).
Step 3 Create and activate a new zone to ensure that the virtual N ports are not visible to real initiators in the
SAN by clicking Yes to the zone creation dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 (Optional) Change the default settings for the transfer data size and the number of concurrent SCSI read
and write commands as follows:
a. Set Transfer Size to the number of bytes that you expect your applications to use over the FCIP link.
b. Set Read I/0 to the number of concurrent SCSI read commands you expect your applications to
generate over the FCIP link.
c. Set Write I/0 to the number of concurrent outstanding SCSI write commands you expect your
applications to generate over the FCIP link.
Note There is only one outstanding I/O at a time to the virtual N-port that emulates the tape behavior.
d. Check the Use Pattern File check box and select a file that you want to use to set the data pattern
that is generated by the SAN extension tuner. See the Data Pattern section on page 49-3.
Step 5 Click Next.
You see the Results dialog box (see Figure 49-6).
Step 6 Click Start to start the tuner. The tuner sends a continuous stream of traffic until you click Stop.
Step 7 Click Show to see the latest tuning statistics. You can select this while the tuner is running or after you
stop it.
Step 8 Click Stop to stop the SAN extension tuner.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 49-1 lists the default settings for tuning parameters.
Parameters Default
Tuning Disabled.
Transfer ready size Same as the transfer size in the SCSI write command.
Outstanding I/Os 1.
Number of transactions 1.
Data generation format All-zero format.
File mark frequency 0.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 50
Configuring iSCSI
Cisco MDS 9000 Family IP storage (IPS) services extend the reach of Fibre Channel SANs by using
open-standard, IP-based technology. The switch allows IP hosts to access Fibre Channel storage using
the iSCSI protocol.
Note The iSCSI feature is specific to the IPS module and is available in Cisco MDS 9200 Switches or Cisco
MDS 9500 Directors.
The Cisco MDS 9216i switch and the 14/2 Multiprotocol Services (MPS-14/2) module also allow you
to use Fibre Channel, FCIP, and iSCSI features. The MPS-14/2 module is available for use in any switch
in the Cisco MDS 9200 Series or Cisco MDS 9500 Series.
Note For information on configuring Gigabit Ethernet interfaces, see Configuring Gigabit Ethernet
Interfaces for IPv4 section on page 52-4.
About iSCSI
Note The iSCSI feature is not supported on the Cisco Fabric Switch for HP c-Class Bladesystem and Cisco
Fabric Switch for IBM BladeCenter.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The iSCSI feature consists of routing iSCSI requests and responses between iSCSI hosts in an IP
network and Fibre Channel storage devices in the Fibre Channel SAN that are accessible from any Fibre
Channel interface of the Cisco MDS 9000 Family switch (see Figure 50-1).
Figure 50-1 Transporting iSCSI Requests and Responses for Transparent iSCSI Routing
Intelligent
IP host A Switch 1 storage array
IP Fibre
iscsi network Channel
SAN
A C
Transporting iSCSI requests Transporting FCP requests
and responses over an IP and responses between a Cisco
network MDS switch and a storage array
B
Routing SCSI requests
91567
and responses
(Through the IPS module)
Each iSCSI host that requires access to storage through the IPS module or MPS-14/2 module needs to
have a compatible iSCSI driver installed. (The Cisco.com website at
http://www.cisco.com/cgi-bin/tablebuild.pl/sn5420-scsi provides a list of compatible drivers.) Using the
iSCSI protocol, the iSCSI driver allows an iSCSI host to transport SCSI requests and responses over an
IP network. From the host operating system perspective, the iSCSI driver appears to be a SCSI transport
driver similar to a Fibre Channel driver in the host.
The IPS module or MPS-14/2 module provides transparent SCSI routing. IP hosts using the iSCSI
protocol can transparently access targets on the Fibre Channel network. Figure 50-1 provides an example
of a typical configuration of iSCSI hosts connected to an IPS module or MPS-14/2 module through the
IP network access Fibre Channel storage on the Fibre Channel SAN.
The IPS module or MPS-14/2 module create a separate iSCSI SAN view and Fibre Channel SAN view.
For the iSCSI SAN view, the IPS module or MPS-14/2 module creates iSCSI virtual targets and then
maps them to physical Fibre Channel targets available in the Fibre Channel SAN. They present the Fibre
Channel targets to IP hosts as if the physical iSCSI targets were attached to the IP network (see
Figure 50-2).
MDS
IP Fibre
iSCSI Network Channel
SAN
Virtual iSCSI Target T-3
Target T-3
120871
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
For the Fibre Channel SAN view, the IPS module or MPS-14/2 module presents iSCSI hosts as a virtual
Fibre Channel host. The storage devices communicate with the virtual Fibre Channel host similar to
communications performed with real Fibre Channel hosts (see Figure 50-3).
MDS
IP Fibre
iSCSI
Network
FC Channel
SAN
host A Virtual Target T-3
FC host A
120872
The IPS modules or MPS-14/2 modules transparently map the command between the iSCSI virtual target
and the virtual Fibre Channel host (see Figure 50-4).
MDS
iSCSI to FCP(FC) routing
FC
Session
IP host A
iSCSI
IP Network iSCSI
Routing SCSI from the IP host to the Fibre Channel storage device consists of the following main
actions:
The iSCSI requests and responses are transported over an IP network between the hosts and the IPS
module or MPS-14/2 module.
The SCSI requests and responses are routed between the hosts on an IP network and the Fibre
Channel storage device (converting iSCSI to FCP and vice versa). The IPS module or MPS-14/2
module performs this conversion and routing.
The FCP requests or responses are transported between the IPS module or MPS-14/2 module and
the Fibre Channel storage devices.
Note FCP (the Fibre Channel equivalent of iSCSI) carries SCSI commands over a Fibre Channel SAN.
Refer to the IETF standards for IP storage at http://www.ietf.org for information on the iSCSI protocol.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Configuring iSCSI
This section describes how to configure iSCSI on the Cisco MDS 9000 Family switches.
This section includes the following sections:
Enabling iSCSI, page 50-4
Creating iSCSI Interfaces, page 50-5
Using the iSCSI Wizard, page 50-5
Presenting Fibre Channel Targets as iSCSI Targets, page 50-7
Presenting iSCSI Hosts as Virtual Fibre Channel Hosts, page 50-14
iSCSI Access Control, page 50-24
iSCSI Session Authentication, page 50-28
iSCSI Immediate Data and Unsolicited Data Features, page 50-31
iSCSI Interface Advanced Features, page 50-32
Enabling iSCSI
To use the iSCSI feature, you must explicitly enable iSCSI on the required switches in the fabric. By
default, this feature is disabled in all switches in the Cisco MDS 9000 Family.
To enable iSCSI on any participating switch using Fabric Manager, follow these steps:
Step 1 Choose End Devices > iSCSI in the Physical Attributes pane.
You see the iSCSI tables in the Information pane (see Figure 50-5).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The Control tab is the default tab. You see the iSCSI enable status for all switches in the fabric that
contain IPS ports.
Step 2 Choose enable from the Command column for each switch that you want to enable iSCSI on.
Step 3 Click the Apply Changes icon to save these changes.
Caution When you disable this feature, all related configurations are automatically discarded.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select an existing iSCSI initiator or add the iSCSI node name or IP address for a new iSCSI initiator.
Step 3 Select the switch for this iSCSI initiator if you are adding a new iSCSI initiator and click Next.
You see the iSCSI Wizard Select Targets dialog box shown in Figure 50-7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select the VSAN and targets to associate with this iSCSI initiator and click Next.
Note The iSCSI wizard turns on the Dynamic Import FC Targets feature.
You see the iSCSI Wizard Select Zone dialog box shown in Figure 50-8.
Step 5 Set the zone name for this new iSCSI zone and check the ReadOnly check box if needed.
Step 6 Click Finish to create this iSCSI initiator.
If created, the target VSAN is added to the iSCSI host VSAN list.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Static mappingManually creates iSCSI target devices and maps them to the whole Fibre Channel
target port or a subset of Fibre Channel LUNs. With this mapping, you must specify unique iSCSI
target names.
Static mapping should be used when iSCSI hosts should be restricted to subsets of LUs in the Fibre
Channel targets and/or iSCSI access control is needed (see the iSCSI Access Control section on
page 50-24). Also, static mapping allows the configuration of transparent failover if the LUs of the
Fibre Channel targets are reachable by redundant Fibre Channel ports (see the Transparent Target
Failover section on page 50-50).
Note The IPS module or MPS-14/2 module does not import Fibre Channel targets to iSCSI by default. Either
dynamic or static mapping must be configured before the IPS module or MPS-14/2 module makes Fibre
Channel targets available to iSCSI initiators.
Dynamic Mapping
When you configure dynamic mapping the IPS module or MPS-14/2 module imports all Fibre Channel
targets to the iSCSI domain and maps each physical Fibre Channel target port as one iSCSI target. That
is, all LUs accessible through the physical storage target port are available as iSCSI LUs with the same
LU number (LUN) as in the physical Fibre Channel target port.
The iSCSI target node name is created automatically using the iSCSI qualified name (IQN) format. The
iSCSI qualified name is restricted to a maximum name length of 223 alphanumeric characters and a
minimum length of 16 characters.
The IPS module or MPS-14/2 module creates an IQN formatted iSCSI target node name using the
following conventions because the name must be unique in the SAN:
IPS Gigabit Ethernet ports that are not part of a Virtual Router Redundancy Protocol (VRRP) group
or PortChannel use this format:
iqn.1987-05.com.cisco:05.<mgmt-ip-address>.<slot#>-<port#>-<sub-intf#>.<Target-pWWN>
IPS ports that are part of a VRRP group use this format:
iqn.1987-05.com.cisco:05.vrrp-<vrrp-ID#>-<vrrp-IP-addr>.<Target-pWWN>
Note If you have configured a switch name, then the switch name is used instead of the management IP
address. If you have not configured a switch name, the management IP address is used.
With this convention, each IPS port in a Cisco MDS 9000 Family switch creates a unique iSCSI target
node name for the same Fibre Channel target port in the SAN.
For example, if an iSCSI target was created for a Fibre Channel target port with pWWN
31:00:11:22:33:44:55:66 and that pWWN contains LUN 0, LUN 1, and LUN 2, those LUNs would
become available to an IP host through the iSCSI target node name iqn.1987-05.com.cisco:05.
MDS_switch_management_IP_address.01-01.3100112233445566 (see Figure 50-9).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
MDS-mgntIP
pwwn 31.00.11.22.33.44.55.66
120780
iqn.1987-05.com.cisco:05.<mgnt-IPaddr>.01-01.3100112233445566
Note Each iSCSI initiator may not have access to all targets depending on the configured access control
mechanisms (see the iSCSI Access Control section on page 50-24).
To enable dynamic mapping of Fibre Channel targets into iSCSI using Device Manager, follow these
steps:
Step 2 Click the Targets tab to display a list of existing iSCSI targets (see Figure 50-11).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Static Mapping
You can manually (statically) create an iSCSI target by assigning a user-defined unique iSCSI node name
to it. The iSCSI qualified name is restricted to a minimum length of 16 characters and a maximum of
223 characters. A statically mapped iSCSI target can either map the whole Fibre Channel target port (all
LUNs in the target port mapped to the iSCSI target), or it can contain one or more LUs from a Fibre
Channel target port (see Figure 50-12).
MDS
Target pwwn
31:00:11:22:33:44:55:66
host B
LUN 0 LUN 0
IP
iSCSI
Network LUN 1 LUN 1
LUN 2 LUN 2
120875
To create a static iSCSI virtual target for the entire Fibre Channel target port using Device Manager,
follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Set the iSCSI target node name in the iSCSI Name field, in IQN format.
Step 5 Set the Port WWN field for the Fibre Channel target port you are mapping.
Step 6 Click the Select from List radio button and set the iSCSI initiator node names or IP addresses that you
want this virtual iSCSI target to access, or click the All radio button to let the iSCSI target access all
iSCSI initiators. Also see the iSCSI Access Control section on page 50-24.
Step 7 Click the Select from List radio button and check each interface you want to advertise the iSCSI targets
on or click the All radio button to advertise all interfaces.
Step 8 Click Apply to save this change.
Tip An iSCSI target cannot contain more than one Fibre Channel target port. If you have already mapped the
whole Fibre Channel target port, you cannot use the LUN mapping option.
Note See the iSCSI-Based Access Control section on page 50-26 for more information on controlling access
to statically mapped targets.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You can limit the Gigabit Ethernet interfaces through which static iSCSI targets are advertised. By
default iSCSI targets are advertised on all Gigabit Ethernet interfaces, subinterfaces, PortChannel
interfaces, and PortChannel subinterfaces.
To configure a specific interface that should advertise the iSCSI virtual target using Device Manager,
follow these steps:
Example 1
This example assigns the whole Fibre Channel target as an iSCSI virtual target. All LUNs that are part
of the Fibre Channel target are available as part of the iSCSI target (see Figure 50-14).
1 1
2 2
3 3 pWWN 28:00:01:02:03:04:05:06
4 4
5 5
112189
6 6
Example 2
This example maps a subset of LUNs of a Fibre Channel target to three iSCSI virtual targets. Each iSCSI
target only has one LUN (see Figure 50-15).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
0 0
1 pWWN 28:00:01:02:03:04:05:06
iqn.1987-02.com.cisco.target-2 2
112190
iqn.1987-02.com.cisco.target-3
Example 3
This example maps three subsets of Fibre Channel LUN targets to three iSCSI virtual targets. Two iSCSI
targets have one LUN and the third iSCSI target has two LUNs (see Figure 50-16).
0 0
1 pWWN 28:00:01:02:03:04:05:06
iqn.1987-02.com.cisco.target-2 2
3
0
0
112191
1
iqn.1987-02.com.cisco.target-3
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Initiator Identification
iSCSI hosts can be identified by the IPS module or MPS-14/2 module using the following:
iSCSI qualified name (IQN)
An iSCSI initiator is identified based on the iSCSI node name it provides in the iSCSI login. This
mode can be useful if an iSCSI host has multiple IP addresses and you want to provide the same
service independent of the IP address used by the host. An initiator with multiple IP addresses
(multiple network interface cardsNICs) has one virtual N port on each IPS port to which it logs in.
IP address
An iSCSI initiator is identified based on the IP address of the iSCSI host. This mode is useful if an
iSCSI host has multiple IP addresses and you want to provide different service-based on the IP
address used by the host. It is also easier to get the IP address of a host compared to getting the iSCSI
node name. A virtual N port is created for each IP address it uses to log in to iSCSI targets. If the
host using one IP address logs in to multiple IPS ports, each IPS port will create one virtual N port
for that IP address.
You can configure the iSCSI initiator identification mode on each IPS port and all the iSCSI hosts
terminating on the IPS port will be identified according to that configuration. The default mode is to
identify the initiator by name.
To specify the initiator identification mode using Fabric Manager, follow these steps:
Step 1 Choose Interfaces > FC Logical from the Physical Attributes pane.
You see the interfaces configuration in the Information pane.
Step 2 Select the iSCSI tab.
You see the iSCSI interfaces configuration.
Step 3 Right-click on the Initiator ID Mode field for the iSCSI interface that you want to modify and select
name or ipaddress from the drop-down menu.
Step 4 Click Apply Changes to save this change.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In proxy initiator mode, there is only one virtual Fibre Channel host per one IPS port and all iSCSI
hosts use that to access Fibre Channel targets. In a scenario where the Fibre Channel storage device
requires explicit LUN access control for every host, the static configuration for each iSCSI initiator
can be overwhelming. In this case, using the proxy initiator mode simplifies the configuration.
Caution Enabling proxy initiator mode of an iSCSI interface that is part of an iSLB VRRP group impacts load
balancing on the interface. See the Changing iSCSI Interface Parameters and the Impact on Load
Balancing section on page 50-45.
The Cisco MDS switches support the following iSCSI session limits:
The maximum number of iSCSI sessions on a switch is 5000.
The maximum number of iSCSI sessions per IPS port in transparent initiator mode is 500.
The maximum number of iSCSI sessions per IPS port in proxy initiator mode is 500.
The maximum number of concurrent sessions an IPS port can create is five (but the total number of
sessions that can be supported is 500).
Note If more than five iSCSI sessions try to come up simultaneously on a port, the initiator receives a
temporary error and later retries to create a session.
Each iSCSI host is presented as one virtual Fibre Channel host (that is, one Fibre Channel N port). The
benefit of transparent mode is it allows a finer-level of Fibre Channel access control configuration.
Because of the one-to-one mapping from iSCSI to Fibre Channel, each host can have different zoning or
LUN access control on the Fibre Channel storage device.
When an iSCSI host connects to the IPS module or MPS-14/2 module, a virtual host N port (HBA port)
is created for the host (see Figure 50-17). Every Fibre Channel N port requires a unique Node WWN and
Port WWN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
MDS
host A
iSCSI
Virtual
FC host A
host B
iSCSI
IP Network
Virtual
host C FC host B Target
T-1
iSCSI
Virtual
120876
FC host C
After the virtual N port is created with the WWNs, a fabric login (FLOGI) is done through the virtual
iSCSI interface of the IPS port. After the FLOGI is completed, the virtual N port is online in the Fibre
Channel SAN and virtual N port is registered in the Fibre Channel name server. The IPS module or
MPS-14/2 module registers the following entries in the Fibre Channel name server:
IP address of the iSCSI host in the IP-address field on the name server
IQN of the iSCSI host in the symbolic-node-name field of the name server
SCSI_FCP in the FC-4 type field of the name server
Initiator flag in the FC-4 feature of the name server
Vendor-specific iSCSI GW flag in the FC-4 type field to identify the N-port device as an iSCSI
gateway device in the name server.
When all the iSCSI sessions from the iSCSI host are terminated, the IPS modules or MPS-14/2 modules
perform an explicit Fabric logout (FLOGO) to remove the virtual N-port device from the Fibre Channel
SAN (this indirectly de-registers the device from the Fibre Channel name server).
For every iSCSI session from the host to the iSCSI virtual target there is a corresponding Fibre Channel
session to the real Fibre Channel target. In Figure 50-17, there are three iSCSI hosts and all three of them
connect to the same Fibre Channel target. There is one Fibre Channel session from each of the three
virtual Fibre Channel hosts to the target.
iSCSI initiator idle timeout specifies the time for which the virtual Fibre Channel N port is kept idle after
the initiator logs out from its last iSCSI session. The default value for this timer is 300 seconds. This is
useful to avoid N ports logging in to and logging off of the Fibre Channel SAN as transient failure occurs
in the IP network. This helps reduce unnecessary RSCNs being generated in the Fibre Channel SAN.
To configure the initiator idle timeout using Fabric Manager, follow these steps:
Step 1 Choose End Devices > iSCSI in the Physical Attributes pane.
You see the iSCSI tables in the Information pane (see Figure 50-5).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Dynamic Mapping
With dynamic mapping, an iSCSI host is mapped to a dynamically generated port WWN (pWWN) and
node WWN (nWWN). Each time the iSCSI host connects it might be mapped to a different WWN. Use
this option if no access control is required on the Fibre Channel target device (because the target device
access control is usually configured using the host WWN).
The WWNs are allocated from the MDS switch's WWN pool. The WWN mapping to the iSCSI host is
maintained as long as the iSCSI host has at least one iSCSI session to the IPS port. When all iSCSI
sessions from the host are terminated and the IPS module or MPS-14/2 module performs an FLOGO for
the virtual N port of the host, the WWNs are released back to the switch's Fibre Channel WWN pool.
These addresses are then available for assignment to other iSCSI hosts requiring access to the Fibre
Channel Fabric.
The following are three dynamic initiator modes are supported:
iSCSIDynamic initiators are treated as iSCSI initiators and can access dynamic virtual targets and
configured iSCSI virtual targets.
iSLBDynamic initiators are treated as iSLB initiators.
DenyDynamic initiators are not allowed to log in to the MDS switch.
iSCSI dynamic mapping is the default mode of operation. This configuration is distributed using CFS.
Note Configuring dynamic initiator modes is supported only through the CLI, not through Device Manager or
Fabric Manager.
Static Mapping
With static mapping, an iSCSI host is mapped to a specific pWWN and nWWN. This mapping is
maintained in persistent storage and each time the iSCSI host connects, the same WWN mapping is used.
This mode is required if you use access control on the target device.
You can implement static mapping in one of two ways:
User assignmentYou can specify your own unique WWN by providing them during the
configuration process.
System assignmentYou can request that the switch provide a WWN from the switchs Fibre
Channel WWN pool and keep the mapping in its configuration.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip We recommend using the system-assign option. If you manually assign a WWN, you must
ensure its uniqueness (see the World Wide Names section on page 37-5). You should not use
any previously assigned WWNs.
To configure static mapping for an iSCSI initiator using Device Manager, follow these steps:
Step 3 Set the iSCSI node name or IP address and VSAN membership.
Step 4 In the Node WWN section, check the Persistent check box.
Step 5 Check the System Assigned check box if you want the switch to assign the nWWN or leave this
unchecked and set the Static WWN field.
Step 6 In the Port WWN section, check the Persistent check box if you want to statically map pWWNs to the
iSCSI initiator.
Step 7 If persistent, check the System Assigned check box and set the number of pWWNs to reserve for this
iSCSI initiator if you want the switch to assign pWWNs. Alternately, you can leave this unchecked and
set one or more pWWNs for this iSCSI initiator.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 8 Optionally set the AuthUser field if authentication is enabled. Also see the iSCSI Session
Authentication section on page 50-28.
Step 9 Click Create to create this iSCSI initiator.
Note If the system-assign option is used to configure WWNs for an iSCSI initiator, when the configuration is
saved to an ASCII file the system-assigned WWNs are also saved. Subsequently if you perform a write
erase, you must manually delete the WWN configuration from the ASCII file. Failing to do so can cause
duplicate WWN assignments if the ASCII configuration file is reapplied on the switch.
Note You cannot convert a dynamic iSCSI initiator to a static iSLB initiator or a dynamic iSLB initiator to a
static iSCSI initiator.
Note Making the dynamic pWWNs static after the initiator is created is supported only through the CLI, not
through Device Manager or Fabric Manager. In Fabric Manager or Device Manager, you must delete and
then recreate this initiator to have the pWWNs static.
Step 1 Choose End Devices > iSCSI in the Physical Attributes pane.
You see the iSCSI tables in the Information pane (see Figure 50-5).
Step 2 Click the Initiators tab.
You see the iSCSI initiators configured.
Step 3 Check the Persistent Node WWN check box for the iSCSI initiators that you want to make static.
Step 4 Click the Apply Changes icon to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In the event that the Fibre Channel storage device requires explicit LUN access control for every host
using the transparent initiator mode (presenting one iSCSI host as one Fibre Channel host) means every
iSCSI host has to be configured statically. This can mean several configuration tasks for each iSCSI host.
In this case, using the proxy initiator mode simplifies the configuration.
In this mode, only one virtual host N port (HBA port) is created per IPS port. All the iSCSI hosts
connecting to that IPS port will be multiplexed using the same virtual host N port (see Figure 50-19).
This mode simplifies the task of statically binding WWNs. LUN mapping and assignment on the Fibre
Channel storage array must be configured to allow access from the proxy virtual N ports pWWN for all
LUNs used by each iSCSI initiator that connects through this IPS port. The LUN is then assigned to each
iSCSI initiator by configuring iSCSI virtual targets (see the Static Mapping section on page 50-10)
with LUN mapping and iSCSI access control (see the iSCSI Access Control section on page 50-24).
MDS
Host A
iSCSI
Proxy initiator
host
Host B
iSCSI
IP network
Host C
iSCSI
120874
Proxy initiator mode can be configured on a per IPS port basis, in which case only iSCSI initiators
terminating on that IPS port will be in this mode.
When an IPS port is configured in proxy-initiator mode, fabric login (FLOGI) is done through the virtual
iSCSI interface of the IPS port. After the FLOGI is completed, the proxy-initiator virtual N port is online
in the Fibre Channel fabric and virtual N port is registered in the Fibre Channel name server. The IPS
module or MPS-14/2 module registers the following entries in the Fibre Channel name server:
iSCSI interface name iSCSI slot /port is registered in the symbolic-node-name field of the name
server
SCSI_FCP in the FC-4 type field of the name server
Initiator flag in the FC-4 feature of the name server
Vendor specific flag (iscsi-gw) in the FC-4 type field to identify the N-port device as an iSCSI
gateway device in the name server
Similar to transparent initiator mode, the user can provide a pWWN and nWWN or request a system
assigned WWN for the proxy initiator N port.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Enabling the proxy initiator mode of an iSCSI interface that is part of an iSLB VRRP group impacts load
balancing on the interface. See the Changing iSCSI Interface Parameters and the Impact on Load
Balancing section on page 50-45.
To configure the proxy initiator using Fabric Manager, follow these steps:
Step 1 Expand Switches, expand Interfaces and then select FC Logical in the Physical Attributes pane.
You see the Interface tables in the Information pane (see Figure 50-20).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note When an interface is in proxy initiator mode, you can only configure Fibre Channel access control
(zoning) based on the iSCSI interfaces proxy N port attributesthe WWN pairs or the FC ID. You
cannot configure zoning using iSCSI attributes such as IP address or IQN of the iSCSI initiator. To
enforce initiator-based access control, use iSCSI based access control (see the iSCSI Access Control
section on page 50-24).
Individual iSCSI hosts can be configured to be in a specific VSAN (similar to the DPVM feature for
Fibre Channel, see Chapter 28, Creating Dynamic VSANs). The specified VSAN overrides the iSCSI
interface VSAN membership.
To assign VSAN membership for iSCSI hosts using Fabric Manager, follow these steps:
Step 1 Choose End Devices > iSCSI in the Physical Attributes pane.
You see the iSCSI tables in the Information pane (see Figure 50-5).
Step 2 Select the Initiators tab.
You see the iSCSI initiators configured.
Step 3 Fill in the VSAN Membership field to assign a VSAN to the iSCSI hosts.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note When an initiator is configured in any other VSAN (other than VSAN 1), for example VSAN 2, the
initiator is automatically removed from VSAN 1. If you also want it to be present in VSAN 1, you must
explicitly configure the initiator in VSAN 1.
VSAN membership can be configured for an iSCSI interface, called the port VSAN. All the iSCSI
devices that connect to this interface automatically become members of this VSAN, if it is not explicitly
configured in a VSAN. In other words, the port VSAN of an iSCSI interface is the default VSAN for all
dynamic iSCSI initiators. The default port VSAN of an iSCSI interface is VSAN 1.
Caution Changing the VSAN membership of an iSCSI interface that is part of an iSLB VRRP group impacts load
balancing on the interface. See the Changing iSCSI Interface Parameters and the Impact on Load
Balancing section on page 50-45.
To change the default port VSAN for an iSCSI interface using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
MDS
Host A
(VSAN X)
VSAN X
iSCSI
Virtual
Host A VSAN X
Host B
IP T1
iSCSI network
VSAN Y
Host C
iSCSI
VSAN Y
Virtual
Virtual
Host B
iSCSI interface 1/1 Host C T2
120870
port VSAN = Y
Host As virtual Fibre Channel N port will be added to VSAN X because of explicit membership for the
initiator. The virtual host-B and host-C N ports do not have any explicit membership configuration so
they will inherit the iSCSI interface VSAN membership and be part of VSAN Y.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note In proxy initiator mode, all iSCSI devices connecting to an IPS port gain access to the Fibre Channel
fabric through a single virtual Fibre Channel N port. Thus, zoning based on the iSCSI node name or IP
address will not have any effect. If zoning based on pWWN is used, then all iSCSI devices connecting
to that IPS port will be put in the same zone. To implement individual initiator access control in proxy
initiator mode, configure an iSCSI ACL on the virtual target (see the iSCSI-Based Access Control
section on page 50-26).
To add an iSCSI initiator to the zone database using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 50-24 Edit Local Zone Database Dialog Box in Fabric Manager
Step 2 Select the VSAN you want to add the iSCSI host initiator to and click OK.
You see the available zones and zone sets for that VSAN (see Figure 50-25).
Step 3 From the list of available devices with iSCSI host initiators, drag the initiators to add into the zone.
Step 4 Click Distribute to distribute the change.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IPv6 address
Note For a transparent mode iSCSI initiator, if both Fibre Channel zoning and iSCSI ACLs are used, then for
every static iSCSI target that is accessible to the iSCSI host, the initiators virtual N port should be in
the same Fibre Channel zone as the Fibre Channel target.
, To configure access control in iSCSI using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If the iSCSI target is an autogenerated iSCSI target, then the IPS module or MPS-14/2 module
extracts the WWN of the Fibre Channel target from the iSCSI target name and verifies if the initiator
and the Fibre Channel target is in the same Fibre Channel zone or not. If they are, then access is
allowed.
The IPS module or MPS-14/2 module uses the Fibre Channel virtual N port of the iSCSI host and does
a zone-enforced name server query for the Fibre Channel target WWN. If the FC ID is returned by the
name server, then the iSCSI session is accepted. Otherwise, the login request is rejected.
Step 1 Choose Switches > Security > AAA in the Physical Attributes pane.
You see the AAA configuration in the Information pane.
Step 2 Click the Applications tab.
You see the AAA configuration per application (see Figure 50-26).
Step 3 Right-click on the ServerGroup Id List field for the iSCSI application and enter the server group that you
want iSCSI to use.
Note You should use an existing server group or create a new server group before configuring it for
iSCSI session authentication.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Authentication Mechanism
You can configure iSCSI CHAP or None authentication at both the global level and at each interface
level.
The authentication for a Gigabit Ethernet interface or subinterface overrides the authentication method
configured at the global level.
To configure AAA authentication for an iSCSI user using Fabric Manager, follow these steps:
Step 1 Choose End Devices > iSCSI in the Physical Attributes pane.
You see the iSCSI tables in the Information pane (see Figure 50-5).
Step 2 Click the Globals tab.
You see the iSCSI authentication configuration table.
Step 3 Select chap or none from the authMethod column.
Step 4 Click the Apply Changes icon in Fabric Manager to save these changes.
To configure the authentication mechanism for iSCSI sessions to a particular interface using Fabric
Manager, follow these steps:
Step 1 Choose Switches > Interfaces > Gigabit Ethernet in the Physical Attributes pane.
You see the Gigabit Ethernet configuration in the Information pane.
Step 2 Click the iSNS tab.
You see the iSCSI and iSNS configuration (see Figure 50-27).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Local Authentication
See the Configuring Users section on page 39-12 to create the local password database. To create users
in the local password database for the iSCSI initiator, the iSCSI keyword is mandatory.
To configure iSCSI users for local authentication using Device Manager, follow these steps:
Step 2 Complete the iSCSI User, Password, and Password Confirmation fields.
Step 3 Click Create to save this new user.
Step 1 Choose End Devices > iSCSI in the Physical Attributes pane.
You see the iSCSI tables in the Information pane (see Figure 50-5).
Step 2 Right-click the AuthUser field and enter the user name to which you want to restrict the iSCSI initiator.
Step 3 Click the Apply Changes icon to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To configure a global iSCSI target user name and password to be used by the switch to authenticate itself
to an initiator using Fabric Manager, follow these steps:
Step 1 Choose End Devices > iSCSI in the Physical Attributes pane.
You see the iSCSI tables in the Information pane (see Figure 50-5).
Step 2 Select the Globals tab.
You see the global iSCSI configuration.
Step 3 Fill in the Target UserName and Target Password fields.
Step 4 Click the Apply Changes icon to save these changes.
To configure a per-initiator iSCSI targets user name and password used by the switch to authenticate
itself to an initiator using Device Manager, follow these steps:
Step 1 Configure the RADIUS server to allow access from the Cisco MDS switch's management Ethernet IP
address.
Step 2 Configure the shared secret for the RADIUS server to authenticate the Cisco MDS switch.
Step 3 Configure the iSCSI users and passwords on the RADIUS server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If an iSCSI initiator supports immediate data and unsolicited data features, these features are
automatically enabled on the MDS switch with no configuration required.
QoS
To set the QoS values using Fabric Manager, follow these steps:
Step 1 Expand Switches, expand Interfaces and then select FC Logical in the Physical Attributes pane.
You see the Interface tables in the Information pane (see Figure 50-20).
Step 2 In Device Manager, choose Interface > Ethernet and iSCSI.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see the Ethernet Interfaces and iSCSI dialog box (see Figure 50-21).
Step 3 Click the iSCSI TCP tab in either Fabric Manager or Device Manager.
You see the iSCSI TCP configuration table.
Step 4 Set the QoS field from 1 to 6.
Step 5 Click the Apply Changes icon in Fabric Manager or click Apply in Device Manager to save these
changes.
Cut-through mode
Cut-through mode improves the read operation performance over store-and-forward mode. The port
on the IPS module or MPS 14/2 module achieves this by forwarding each Fibre Channel data-in
frame to the iSCSI host as it is received without waiting for the whole exchange complete. There is
no difference for write data-out operations from store-and-forward mode.
Figure 50-29 compares the messages exchanged by the iSCSI routing modes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
TCP part 1
iSCSI Data16
contains iSCSI
Data-in Data2
Data-in PDU #1 TCP part 16
PDU #2
DSlen = 16KB
Status
iSCSI TCP part 2 Response1
Data-in Data16
PDU #16
Status
Response1 Command2
TCP part 16
Status
Command2 Response1
130687
Command2
Table 50-1 compares the advantages and disadvantages of the different iSCSI routing modes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Changing the forwarding mode of an iSCSI interface that is part of an iSLB VRRP group impacts load
balancing on the interface. See the Changing iSCSI Interface Parameters and the Impact on Load
Balancing section on page 50-45.
Configuring iSLB
The iSCSI server load balancing (iSLB) feature provides a means to easily configure large scale iSCSI
deployments containing hundreds or even thousands of initiators. When not using iSLB, configuring
iSCSI requires the following:
You need to perform multiple configuration steps on the MDS switch, including the following:
Initiator configuration using static pWWN and VSAN.
Zoning configuration for initiators and targets.
Optional create virtual target and give access to the initiator.
Configuration of target LUN mapping and masking on the storage system for the initiator based
on the static pWWN created for the initiator on the MDS switch.
You need to duplicate the configuration manually on multiple MDS switches.
There is no load balancing for IPS ports. For example:
The Virtual Router Redundancy Protocol (VRRP) only supports active and backup, not load
balancing.
You must use multiple VRRP groups and configure hosts in different groups.
iSLB provides the following features:
The iSLB initiator configuration is simplified with support for initiator targets and auto-zones.
Cisco Fabric Services (CFS) eliminates the need for manual configuration by distributing the iSLB
initiator configuration among all MDS switches in the fabric.
Note Only statically mapped iSLB initiator configuration is distributed throughout the fabric
using CFS. Dynamically and statically mapped iSCSI initiator configurations are not
distributed.
Dynamic load balancing of iSLB initiators is available using iSCSI login redirect and VRRP.
This section covers the following topics:
About iSLB Configuration Limits, page 50-36
iSLB Configuration Prerequisites, page 50-36
About iSLB Initiators, page 50-37
Configuring iSLB Using Device Manager, page 50-37
Configuring iSLB Initiators, page 50-39
About Load Balancing Using VRRP, page 50-43
Configuring Load Balancing Using VRRP, page 50-45
About iSLB Configuration Distribution Using CFS, page 50-46
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Before configuring iSLB, you must enable iSCSI (see the Enabling iSCSI section on page 50-4).
Note For iSLB, all switches in the fabric must be running Cisco MDS SAN-OS Release 2.1(1a) or later.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Set the Name or IP Address field to the iSLB name or IP address.
Step 4 Set the VSAN Membership field to the VSAN that you want the iSLB initiator in.
Also see the Assigning VSAN Membership for iSLB Initiators section on page 50-40.
Step 5 Check the Persistent check box to convert a dynamic nWWN to static for the iSLB initiator.
Also see the Making the Dynamic iSLB Initiator WWN Mapping Static section on page 50-40.
Step 6 (Optional) Check the SystemAssigned check box to have the switch assign the nWWN.
Step 7 (Optional) Set the Static WWN field to manually assign the static nWWN. You must ensure uniqueness
for this nWWN.
Step 8 (Optional) Check the Port WWN Mapping Persistent check box to convert dynamic pWWNs to static
for the iSLB initiator.
See the Making the Dynamic iSLB Initiator WWN Mapping Static section on page 50-40.
Step 9 (Optional) Check the SystemAssigned check box and set the number of pWWNs you want to have the
switch assign the PWWN.
Step 10 (Optional) Set the Static WWN(s) field to manually assign the static pWWNs.
You must ensure uniqueness for these pWWN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 11 (Optional) Set the AuthUser field to the username that you want to restrict the iSLB initiator to for iSLB
authentication.
Also see the Restricting iSLB Initiator Authentication section on page 50-43.
Step 12 Fill in the Username and Password fields to configure iSLB initiator target CHAP authentication.
Also see the Configuring iSLB Session Authentication section on page 50-43.
Step 13 In the Initiator Specific Target section, set the pWWN to configure an iSLB initiator target.
Step 14 (Optional) Set the Name field to a globally unique identifier (IQN).
Step 15 (Optional) Check the NoAutoZoneCreation check box to disable auto-zoning.
Also see the Configuring and Activating Zones for iSLB Initiators and Initiator Targets section on
page 50-42.
Step 16 Optionally, check the TresspassMode check box.
Also see the LUN Trespass for Storage Port Failover section on page 50-53.
Step 17 Optionally, check the RevertToPrimary check box to revert back to the primary port after an HA
failover when the primary port comes back up.
Step 18 Set the PrimaryVsan to the VSAN for the iSLB initiator target.
Step 19 Click Create to create this iSLB initiator.
Step 20 If CFS is enabled, select commit from the CFS drop-down menu.
Note Assigning WWNs for iSLB initiators is the same as for iSCSI initiators. For information on dynamic and
static mapping, see the WWN Assignment for iSCSI Initiators section on page 50-17.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip We recommend using the SystemAssign option. If you manually assign a WWN, you must ensure its
uniqueness (see the World Wide Names section on page 37-5). You should not use any previously
assigned WWNs.
See the Configuring iSLB Using Device Manager procedure on page 50-37.
Note Making the dynamic mapping for iSLB initiators static is the same as for iSCSI. See the Making the
Dynamic iSLB Initiator WWN Mapping Static section on page 50-40.
Note Only statically mapped iSLB initiator configuration is distributed throughout the fabric using CFS.
Dynamically and statically configured iSCSI initiator configurations are not distributed.
See the Configuring iSLB Using Device Manager procedure on page 50-37.
Note Specifying the iSLB initiator VSAN is the same as for an iSCSI initiator. See the VSAN Membership
for iSCSI section on page 50-22.
Note When an iSLB initiator is configured in any other VSAN (other than VSAN 1, the default VSAN), for
example VSAN 2, the initiator is automatically removed from VSAN 1. If you also want it to be present
in VSAN 1, you must explicitly configure the initiator in VSAN 1.
See the Configuring iSLB Using Device Manager procedure on page 50-37.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
For more information on load balancing, see the About Load Balancing Using VRRP section on
page 50-43.
Choose IP > iSCSI iSLB in Device Manager and set the LoadMetric field to change the load balancing
metric for an iSLB initiator.
See the Configuring iSLB Using Device Manager procedure on page 50-37.
Note The VSAN identifier is optional if the target is online. If the target is not online, the VSAN
identifier is required.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Fill in the pWWN field with the initiator target pWWN.
Step 5 (Optional) Set the Name field to a globally unique identifier (IQN).
Step 6 (Optional) Check the NoAutoZoneCreation check box to disable auto-zoning (see Figure 50-31). See
the Configuring and Activating Zones for iSLB Initiators and Initiator Targets section on page 50-42.
Step 7 (Optional) Check the TresspassMode check box. See the LUN Trespass for Storage Port Failover
section on page 50-53.
Step 8 (Optional) Check the RevertToPrimary check box to revert back to the primary port after an HA
failover when the primary port comes back up.
Step 9 Set the PrimaryVsan to the VSAN for the iSLB initiator target.
Step 10 Click Create to create this iSLB initiator target.
Step 11 If CFS is enabled, select commit from the CFS drop-down menu.
Configuring and Activating Zones for iSLB Initiators and Initiator Targets
You can configure a zone name where the iSLB initiators and initiator targets are added. If you do not
specify a zone name, the IPS manager creates one dynamically. iSLB zone sets have the following
considerations:
Auto-zoning of the initiator with the initiator targets is enabled by default.
A zone set must be active in a VSAN for auto-zones to be created in that VSAN.
iSLB zone set activation might fail if another zone set activation is in process or if the zoning
database is locked. Retry the iSLB zone set activation if a failure occurs. To avoid this problem, only
perform only one zoning related operation (normal zones, IVR zones, or iSLB zones) at a time.
Auto-zones are created when the zone set is activated and there has been at least one change in the
zoneset. The activation has no effect if only the auto-zones have changed.
Caution If IVR and iSLB are enabled in the same fabric, at least one switch in the fabric must have both features
enabled. Any zoning related configuration or activation operation (for normal zones, IVR zones, or iSLB
zones) must be performed on this switch. Otherwise, traffic might be disrupted in the fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Choose IP > iSCSI iSLB in Device Manager and set the autoZoneName field to change the auto zone
name for an iSLB initiator.
See the Configuring iSLB Using Device Manager procedure on page 50-37.
Note Specifying the iSLB session authentication is the same as for iSCSI. See the iSCSI Session
Authentication section on page 50-28.
By default, the iSLB initiator can use any user name in the RADIUS or local AAA database in
authenticating itself to the IPS module or MPS-14/2 module (the CHAP user name is independent of the
iSLB initiator name). The IPS module or MPS-14/2 module allows the initiator to log in as long as it
provides a correct response to the CHAP challenge sent by the switch. This can be a problem if one
CHAP user name and password have been compromised.
Choose IP > iSCSI iSLB in Device Manager and set the AuthName field to restrict an initiator to use a
specific user name for CHAP authentication.
See the Configuring iSLB Using Device Manager procedure on page 50-37.
In addition to the IPS module and MPS-14/2 module authentication of the iSLB initiator, the IPS module
and MPS-14/2 module also support a mechanism for the iSLB initiator to authenticate the Cisco MDS
switchs initiator target during the iSCSI login phase. This authentication requires the user to configure
a user name and password for the switch to present to the iSLB initiator. The provided password is used
to calculate a CHAP response to a CHAP challenge sent to the IPS port by the initiator.
Choose IP > iSCSI iSLB in Device Manager and set the Target Username and Target Password fields to
configure a per-initiator user name and password used by the switch to authenticate itself to an initiator.
See the Configuring iSLB Using Device Manager procedure on page 50-37.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
T1 T2 T3 T4
IPS IPS
VRRP Backup Backup 2
master master
IP network
154018
The host is configured with a VRRP address as the portal address. When the VRRP master port receives
the first iSCSI session from an initiator, it assigns a backup port to serve that particular host. This
information is synchronized to all switches through CFS if recovery is needed when a master port fails.
The initiator gets a temporary redirect iSCSI login response. The host then logs in to the backup port at
its physical IP address. If the backup port goes down, the host will revert to the master port. The master
port knows through CFS that the backup port has gone down and redirects the host to another backup
port.
Note If an Ethernet PortChannel is configured between the IPS module and an Ethernet switch, the load
balancing policy on the Ethernet switch must be based on source/destination IP address only, not port
numbers, for load balancing with VRRP to operate correctly.
Note An initiator can also be redirected to the physical IP address of the master interface.
Tip iSLB VRRP load balancing is based on the number of iSLB initiators and not number of sessions. Any
iSLB initiator that has more targets configured than the other iSLB initiators (resulting in more sessions)
should be configured with a higher load metric. For example, you can increase the load metric of the
iSLB initiator with more targets to 3000 from the default value of 1000.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution A Gigabit Ethernet interface configured for iSLB can only be in one VRRP group because redirected
sessions do not carry information about the VRRP IP address or group. This restriction allows the slave
port to uniquely identify the VRRP group to which it belongs.
Caution Changing the VSAN, proxy initiator, authentication, and forwarding mode for iSCSI interfaces in a
VRRP group can cause sessions to go down multiple times.
Note The VRRP master interface is treated specially and it takes lower load compared to the other interfaces.
This is to account for the redirection work performed by the master interface for every session. A new
initiator is assigned to the master interface only if the following is true for every other interface:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note iSLB is only fully supported when CFS is enabled. Using iSLB auto-zoning without enabling CFS mode
may cause traffic disruption when any zone set is activated.
Note CFS does not distribute non-iSLB initiator configurations or import Fibre Channel target settings.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip The pending changes are only available in the volatile directory and are discarded if the switch is
restarted.
Step 2 Set the Command field to enable for the iSLB feature.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note iSCSI configuration changes are not allowed when an iSLB CFS session is active.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip The pending changes are only available in the volatile directory and are discarded if the switch is
restarted.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
User intervention is not required when the same iSLB initiator has a different set of non-conflicting
initiator targets. The merged configuration is the union of all the initiator targets.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
MDS
IP Network Switch Storage
IP 10.1.1.1/24 IP 20.1.1.1/24 P1
Ethernet 1/1
iSCSI switch
2/1
10.1.1.2/24 21.1.1.1/24 P2
MDS 1
Logical View
Session 1 iqn.com.cisco.mds-1.1-1.P1
H1
Session 2 iSCSI
iqn.com.cisco.mds-
1.1-1.P2 P1
iSCSI IP Network
P2
H2
iqn.com.cisco.mds-
Session 3
1.1-1.P2 iSCSI
Session 4
P2
120743
Each IPS ports is exporting the same two Fibre Channel target ports of the storage but as different iSCSI
target names if you use dynamic iSCSI targets). So the two IPS ports are exporting a total of four iSCSI
target devices. These four iSCSI targets map the same two ports of the Fibre Channel target.
The iSCSI host uses NIC-1 to connect to IPS port 1 and NIC-2 to connect to IPS port 2. Each IPS port
exports two iSCSI targets, so the iSCSI host creates four iSCSI sessions.
If the iSCSI host NIC-1 fails (see Figure 50-36 for the physical view), then sessions 1 and 2 fail but we
still have sessions 3 and 4.
If the IPS port 1 fails, the iSCSI host cannot connect to the IPS port, and sessions 1 and 2 fail. But
sessions 3 and 4 are still available.
If the storage port 1 fails, then the IPS ports will terminate sessions 1 and 3 (put iSCSI virtual target
iqn.com.cisco.mds-5.1-2.p1 and iqn-com.cisco.mds-5.1-1.p1 in offline state). But sessions 2 and 4 are
still available.
In this topology, you have recovery from failure of any of the components. The host multi-path software
takes care of load-balancing or failover across the different paths to access the storage.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IP storage has two additional features that provide an HA solution in this scenario.
IPS ports support the VRRP feature (see the Configuring VRRP for Gigabit Ethernet Interfaces
section on page 52-9) to provide failover for IPS ports.
IPS has transparent Fibre Channel target failover for iSCSI static virtual targets.
Statically imported iSCSI targets have an additional option to provide a secondary pWWN for the Fibre
Channel target. This can be used when the physical Fibre Channel target is configured to have an LU
visible across redundant ports. When the active port fails, the secondary port becomes active and the
iSCSI session switches to use the new active port (see Figure 50-37).
Figure 50-37 Static Target Importing Through Two Fibre Channel Ports
91568
ABC
In Figure 50-37, you can create an iSCSI virtual target that is mapped to both pWWN1 and pWWN2 to
provide redundant access to the Fibre Channel targets.
The failover to a secondary port is done transparently by the IPS port without impacting the iSCSI
session from the host. All outstanding I/Os are terminated with a check condition status when the
primary port fails. New I/Os received during the failover are not completed and receive a busy status.
Tip If you use LUN mapping, you can define a different secondary Fibre Channel LUN if the LU number is
different.
Enable the optional revert-primary-port option to direct the IPS port to switch back to the primary port
when the primary port is up again. If this option is disabled (default) and the primary port is up again
after a switchover, the old sessions will remain with the secondary port and do not switch back to the
primary port. However, any new session will use the primary port. This is the only situation when both
the primary and secondary ports are used at the same time.
To create a static iSCSI virtual target for the entire Fibre Channel target port using Device Manager,
follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Click the Select from List radio button and set the iSCSI initiator node names or IP addresses that you
want this virtual iSCSI target to access, or choose the All radio button to let the iSCSI target access all
iSCSI initiators See the iSCSI Access Control section on page 50-24.
Step 7 Chick the Select from List radio button and check each interface you want to advertise the iSCSI targets
on or choose the All radio button to advertise all interfaces.
Step 8 Click Apply to save this change.
pWWN a1:94:cc
fcid 0x550002
Primary FC
iSCSI IP network Secondary 105219
In Device Manager, choose IP > iSCSI, select the Targets tab, and check the Trespass Mode check box
to enable the trespass feature for a static iSCSI virtual target.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IP IP-10.1.10.100 FC
network
iSCSI
HBA
IP-10.1.1.1 FC fabric pWWN-P1
iqn.host-1
FC
IP-10.1.10.100
lqn.com.cisco.mds.5-3.gw.p1
IP
network
iSCSI
HBA
Network portal 10.1.1.1
iqn.host-1
FC
IP-10.1.1.1
lqn.com.cisco.mds.2-1.gw.p1
90861
In Figure 50-39, each iSCSI host discovers two iSCSI targets for every physical Fibre Channel target
(with different names). The multi-pathing software on the host provides load-balancing over both paths.
If one Gigabit Ethernet interface fails, the host multi-pathing software is not affected because it can use
the second path.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IP FC
network
iSCSI
HBA
Virtual IP-10.1.1.1
lqn.com.cisco.mds.vr1.gw.p1
IP
iSCSI
HBA network
iqn.host-1
FC
lqn.com.cisco.mds.vr1.gw.p1
In Figure 50-40, each iSCSI host discovers one iSCSI target for every physical Fibre Channel target. 90862
When the Gigabit Ethernet interface of the VRRP master fails, the iSCSI session is terminated. The host
then reconnects to the target and the session comes up because the second Gigabit Ethernet interface has
taken over the virtual IP address as the new master.
Note All iSCSI data traffic for one iSCSI link is carried on one TCP connection. Consequently, the aggregated
bandwidth is 1 Gbps for that iSCSI link.
Figure 50-41 provides a sample Ethernet PortChannel-based high availability iSCSI configuration.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
iqn.host-2 FC fabric FC
IP
network
IP-10.1.1.1 pWWN-P2
iSCSI
HBA
iqn.host-1
90863
pWWN-P1
In Figure 50-41, each iSCSI host discovers one iSCSI target for every physical Fibre Channel target. The
iSCSI session from the iSCSI host to the iSCSI virtual target (on the IPS port) uses one of the two
physical interfaces (because an iSCSI session uses one TCP connection). When the Gigabit Ethernet
interface fails, the IPS module and the Ethernet switch transparently forwards all the frames on to the
second Gigabit Ethernet interface.
Note If an Ethernet PortChannel is configured between the IPS module and an Ethernet switch, the load
balancing policy on the Ethernet switch must be based on source/destination IP address only, not port
numbers, for load balancing with VRRP to operate correctly.
Caution Changing the authentication of an iSCSI interface that is part of an iSLB VRRP group impacts load
balancing on the interface. See the Changing iSCSI Interface Parameters and the Impact on Load
Balancing section on page 50-45.
No Authentication
Set the iSCSI authentication method to none to configure a network with no authentication.
In Fabric Manager, choose End Devices > iSCSI in the Physical Attributes pane. Then select the
Globals tab and set the AuthMethod drop-down menu to none and click Apply Changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Set the AAA authentication to use the local password database for the iSCSI protocol:
a. In Fabric Manager, choose Switches > Security > AAA in the Physical Attributes pane.
b. Click the Applications tab in the Information pane.
c. Check the Local check box for the iSCSI row and click Apply Changes.
Step 2 Set the iSCSI authentication method to require CHAP for all iSCSI clients.:
a. In Fabric Manager, choose End Devices > iSCSI in the Physical Attributes pane.
b. Click the Globals tab in the Information pane.
c. Set the AuthMethod drop-down menu to chap and click Apply Changes.
Step 3 Configure the user names and passwords for iSCSI users:
a. In Device Manager, choose Security > iSCSI.
b. Set the Username, Password and Confirm Password fields.
c. Click Create to save these changes.
Step 4 Verify the global iSCSI authentication setup:
a. In Fabric Manager, choose End Devices > iSCSI in the Physical Attributes pane.
b. Click the Globals tab in the Information pane.
Step 1 :Configure the password for the Cisco MDS switch as RADIUS client to the RADIUS server:
a. In Fabric Manager, choose Switches > Security > AAA > RADIUS in the Physical Attributes pane.
b. Click the Default tab in the Information pane.
c. Set the AuthKey field to the default password and click the Apply Changes icon.
Step 2 Configure the RADIUS server IP address:
a. In Fabric Manager, choose Switches > Security > AAA > RADIUS in the Physical Attributes pane.
b. Click the Server tab in the Information pane and click Create Row.
c. Set the Index field to a unique number.
d. Set the IP Type radio button to ipv4 or ipv6.
e. Set the Name or IP Address field to the IP address of the RADIUS server and click Create.
Step 3 Create a RADIUS server group and add the RADIUS server to the group:
a. In Fabric Manager, choose Switches > Security > AAA in the Physical Attributes pane.
b. Select the Server Groups tab in the Information pane and click Create Row.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Configure the RADIUS server to allow access from the Cisco MDS switch's management Ethernet IP
address.
Step 2 Configure the shared secret for the RADIUS server to authenticate the Cisco MDS switch.
Step 3 Configure the iSCSI users and passwords on the RADIUS server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The iSCSI initiator host 1 with IPv4 address 10.11.1.10 and name
iqn.1987-05.com.cisco:01.255891611111 connects to IPS port 7/1 is identified using IPv4
address (host 1 = 10.11.1.10).
The iSCSI initiator host 2 with IPv4 address 10.15.1.10 and node name
iqn.1987-05.com.cisco:01.25589167f74c connects to IPS port 7/5.
Host 1 iSCSI-zone-1
10.11.1.10 Switch 1
o.01.255891611111
iSCSI Interface fc 2/5
21:00:00:20:37:6f:fe:54
10.15.1.10
.01.25589167F74C iSCSI
iSCSI-zone-2
Host 2
Interface fc 2/9
7/5 21:00:00:20:37:a6:a6:5d
94136
To configure scenario 1 (see Figure 50-42), follow these steps:
Step 1 Configure null authentication for all iSCSI hosts in Cisco MDS switches.
a. In Fabric Manager, choose End Devices > iSCSI in the Physical Attributes pane.
b. Select none from the AuthMethod drop-down menu in the Information pane.
c. Click the Apply Changes icon.
Step 2 Configure iSCSI to dynamically import all Fibre Channel targets into the iSCSI SAN using
auto-generated iSCSI target names.
a. In Device Manager, click IP > iSCSI.
b. Click the Targets tab.
c. Check the Dynamically Import FC Targets check box.
d. Click Apply.
Step 3 Configure the Gigabit Ethernet interface in slot 7 port 1 with an IPv4 address and enable the interface.
a. In Fabric Manager, choose Switches > Interfaces > Gigabit Ethernet in the Physical Attributes
pane.
b. Select the IP Address tab in the Information pane and click Create Row.
c. Set the IP address and subnet mask for the Gigabit Ethernet interface in slot 7 port 1.
d. Click Create.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
e. Select the General tab and select up from the Admin drop-down menu for the Gigabit Ethernet
interface in slot 7 port 1.
f. Click the Apply Changes icon.
Step 4 Configure the iSCSI interface in slot 7 port 1 to identify all dynamic iSCSI initiators by their IP address,
and enable the interface.
a. In Fabric Manager, choose Switches > Interfaces > FC Logical in the Physical Attributes pane.
b. Click the iSCSI tab in the Information pane.
c. Select ipaddress from the Initiator ID Mode drop-down menu and click the Apply Changes icon.
d. In Device Manager, choose Interfaces > Ethernet and iSCSI.
e. Click the iSCSI tab.
f. Select up from the Admin drop-down menu for the iSCSI interface in slot 7 port 1.
g. Click Apply.
Step 5 Configure the Gigabit Ethernet interface in slot 7 port 5 with an IPv4 address and enable the interface.
a. In Fabric Manager, choose Switches > Interfaces > Gigabit Ethernet in the Physical Attributes
pane.
b. Click the IP Address tab in the Information pane and click Create Row.
c. Set the IP address and subnet mask for the Gigabit Ethernet interface in slot 7 port 5.
d. Click Create.
e. Select the General tab and select up from the Admin drop-down menu for the Gigabit Ethernet
interface in slot 7 port 5.
f. Click the Apply Changes icon.
Step 6 Configure the iSCSI interface in slot 7 port 5 to identify all dynamic iSCSI initiators by node name and
enable the interface.
a. In Fabric Manager, choose Switches > Interfaces > FC Logical in the Physical Attributes pane.
b. Click the iSCSI tab in the Information pane.
c. Select name from the Initiator ID Mode drop-down menu and click the Apply Changes icon.
d. In Device Manager, choose Interfaces > Ethernet and iSCSI.
e. Click the iSCSI tab.
f. Select up from the Admin drop-down menu for the iSCSI interface in slot 7 port 5.
g. Click Apply.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Use the IP address of the host in zone membership configuration because the iSCSI interface is
configured to identify all hosts based on IP address.
a. In Fabric Manager, choose Zones > Edit Local Full Zone Database.
b. Select VSAN 1 from the VSAN drop-down menu in the Edit Local Full Zone Database dialog box.
c. Select the Zones folder in the left navigation pane and click Insert.
d. Set the Zone Name field to iscsi-zone-1 and click OK.
e. Select the iscsi-zone-1 folder in the left navigation pane and click Insert.
f. Set the ZoneBy radio button toWWN.
g. Set the Port WWN to the pWWN for the Fibre Channel target (that is, 21:00:00:20:37:6f:fd:97) and
click Add.
h. Set the ZoneBy radio button to iSCSI IP Address/Subnet.
i. Set the IP Address/Mask field to the IP Address for Host 1 iSCSI initiator (10.11.1.10) and click
Add.
Step 9 Create a zone named iscsi-zone-2 with host 2 and two Fibre Channel targets in it.
Note Use the symbolic node name of the iSCSI host in zone membership configuration because the
iSCSI interface is configured to identify all hosts based on node name.
a. In Fabric Manager, choose Zones > Edit Local Full Zone Database from the main menu.
b. Select VSAN 2 from the VSAN drop-down menu in the Edit Local Full Zone Database dialog box.
c. Select the Zones folder in the left navigation pane and click Insert.
d. Set the Zone Name field to iscsi-zone-2 and click OK.
e. Select the iscsi-zone-2 folder in the left navigation pane and click Insert.
f. Set the ZoneBy radio button toWWN.
g. Set the Port WWN to the pWWN for one of the Fibre Channel targets (for example,
21:00:00:20:37:6f:fe:5). and click Add.
h. Set the Port WWN to the pWWN for another of the Fibre Channel targets (for example,
21:00:00:20:37:a6:a6:5d). and click Add.
i. Set the ZoneBy radio button to iSCSI name.
j. Set the Port Name field to the symbolic name for host 2 (iqn.1987-05.com.cisco:01.25589167f74c)
and click Add.
Step 10 Create a zone set, add the two zones as members, and activate the zone set.
Note iSCSI interface is configured to identify all hosts based on node name.
a. In Fabric Manager, choose Zones > Edit Local Full Zone Database.
b. Select VSAN 1 from the VSAN drop-down menu in the Edit Local Full Zone Database dialog box.
c. Select the Zoneset folder in the left navigation pane and click Insert.
d. Set the Zoneset Name to zonset-iscsi and click OK.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 15 In Device Manager, Choose FC > Name Server. The Fibre Channel name server shows the virtual N
ports created for the iSCSI hosts.
Step 16 In Device Manager, Choose FC > Name Server.
Step 17 Click the Advanced tab. Verify the detailed output of the iSCSI initiator nodes in the Fibre Channel
name server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Interface fc 2/1
21:00:00:20:37:6f:fd:97
Host 1 VSAN 1
iSCSI
Switch 1 iSCSI
Interface fc 2/5
21:00:00:20:37:6f:fe:54
iSCSI
VSAN 2
Host 2
Interface fc 2/9
21:00:00:20:37:a6:a6:5d
94137
To configure scenario 2 (see Figure 50-43), follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
c. Select ipaddress from the Initiator ID Mode drop-down menu and click the Apply Changes icon.
d. In Device Manager, choose Interfaces > Ethernet and iSCSI.
e. Click the iSCSI tab.
f. Select up from the Admin drop-down menu for the iSCSI interface in slot 7 port 1.
g. Click Apply.
Step 5 Configure the Gigabit Ethernet interface in slot 7 port 5 with the IPv4 address and enable the interface.
a. In Fabric Manager, choose Switches > Interfaces > Gigabit Ethernet in the Physical Attributes
pane.
b. Click the IP Address tab in the Information pane and click Create Row.
c. Set the IP address and subnet mask for the Gigabit Ethernet interface in slot 7 port 5.
d. Click Create.
e. Select the General tab and select up from the Admin drop-down menu for the Gigabit Ethernet
interface in slot 7 port 5.
f. Click the Apply Changes icon.
Step 6 Configure the iSCSI interface in slot 7 port 5 to identify all dynamic iSCSI initiators by IP address and
enable the interface.
a. In Fabric Manager, choose Switches > Interfaces > FC Logical in the Physical Attributes pane.
b. Click the iSCSI tab in the Information pane.
c. Select ipaddress from the Initiator ID Mode drop-down menu and click the Apply Changes icon.
d. In Device Manager, choose Interfaces > Ethernet and iSCSI.
e. Click the iSCSI tab.
f. Select up from the Admin drop-down menu for the iSCSI interface in slot 7 port 5.
g. Click Apply.
Step 7 Configure for static pWWN and nWWN for host 1.
a. In Device Manager, choose IP > iSCSI.
b. Click the Initiators tab.
c. Check the Node Address Persistent and Node Address System-assigned check boxes the Host 1
iSCSI initiator.
d. Click Apply.
Step 8 Configure for static pWWN for Host 2.
a. In Device Manager, Choose IP > iSCSI.
b. Click the Initiators tab.
c. Right-click on the Host 2 iSCSI initiator and click Edit pWWN.
d. Select 1 from the System-assigned Num field and click Apply.
Step 9 View the configured WWNs.
Note The WWNs are assigned by the system. The initiators are members of different VSANs.
a. In Fabric Manager, choose End Devices > iSCSI in the Physical Attributes pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Use the IP address of the host in zone membership configuration because the iSCSI interface is
configured to identify all hosts based on IP address.
a. In Fabric Manager, choose Zones > Edit Local Full Zone Database.
b. Select VSAN 1 from the VSAN drop-down menu in the Edit Local Full Zone Database dialog box.
c. Select the Zones folder in the left navigation pane and click Insert.
d. Set the Zone Name field to iscsi-zone-1 and click OK.
e. Select the iscsi-zone-1 folder in the left navigation pane and click Insert.
f. Set the ZoneBy radio button to WWN.
g. Set the Port WWN to the pWWN for the Fibre Channel target (that is, 21:00:00:20:37:6f:fd:97). and
click Add.
h. Set the ZoneBy radio button to iSCSI IP Address/Subnet.
i. Set the IP Address/Mask field to the IP Address for Host 1 iSCSI initiator (10.11.1.10) and click
Add.
Note Fibre Channel storage for zone membership for the iSCSI initiator, either the iSCSI symbolic
node name or the pWWN, can be used. In this case, the pWWN is persistent.
Note If the host is in VSAN 2, the Fibre Channel targets and zone must also be in VSAN 2.
Note iSCSI interface is configured to identify all hosts based on node name.
a. In Fabric Manager, choose Zones > Edit Local Full Zone Database.
b. Select VSAN 2 from the VSAN drop-down menu in the Edit Local Full Zone Database dialog box.
c. Select the Zones folder in the left navigation pane and click Insert.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 18 In Device Manager, choose FC > Name Server. The Fibre Channel name server shows the virtual N
ports created for the iSCSI hosts.
Step 19 In Device Manager, Choose FC > Name Server.
Step 20 Click the Advanced tab. Verify the detailed output of the iSCSI initiator nodes in the Fibre Channel
name server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
iSNS
Internet Storage Name Service (iSNS) allows your existing TCP/IP network to function more effectively
as a SAN by automating the discovery, management, and configuration of iSCSI devices. To facilitate
these functions, the iSNS server and client function as follows:
The iSNS client registers iSCSI portals and all iSCSI devices accessible through them with an iSNS
server.
The iSNS server provides the following services for the iSNS client:
Device registration
State change notification
Remote domain discovery services
All iSCSI devices (both initiator and target) acting as iSNS clients, can register with an iSNS server.
iSCSI initiators can then query the iSNS server for a list of targets. The iSNS server will respond with a
list of targets that the querying client can access based on configured access control parameters.
A Cisco MDS 9000 Family switch can act as an iSNS client and register all available iSCSI targets with
an external iSNS server. All switches in the Cisco MDS 9000 Family with IPS modules or MPS-14/2
modules installed support iSNS server functionality. This allows external iSNS clients, such as an iSCSI
initiator, to register with the switch and discover all available iSCSI targets in the SAN.
This section includes the following topics:
About iSNS Client Functionality, page 50-67
Creating an iSNS Client Profile, page 50-68
About iSNS Server Functionality, page 50-69
Configuring iSNS Servers, page 50-71
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
When the iSNS client is unable to register or deregister objects with the iSNS server (for example, the
client is unable to make a TCP connection to the iSNS server), it retries every minute to reregister all
iSNS objects for the affected interfaces with the iSNS server. The iSNS client uses a registration interval
value of 15 minutes. If the client fails to refresh the registration during this interval, the server will
deregister the entries.
Untagging a profile also causes the network entity and portal to be deregistered from that interface.
Step 1 Choose End Devices > iSCSI in the Physical Attributes pane.
You see the iSCSI configuration in the Information pane (see Figure 50-10).
Step 2 Select the iSNS tab.
Step 3 You see the iSNS profiles configured (see Figure 50-44).
Step 1 Choose End Devices > iSCSI from the Physical Attributes pane.
You see the iSCSI configuration in the Information pane (see Figure 50-10).
Step 2 Select the iSNS tab.
You see the iSNS profiles configured (see Figure 50-44).
Step 3 Right-click on the profile that you want to delete and click the Delete Row icon.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Switches > Interfaces > Gigabit Ethernet in the Physical Attributes pane.
You see the Gigabit Ethernet configuration in the Information pane.
Step 2 Click the iSNS tab.
You see the iSNS profiles configured for these interfaces (see Figure 50-45).
Step 3 Set the iSNS ProfileName field to the iSNS profile name that you want to add to this interface.
Step 4 Click the Apply Changes icon to save these changes.
To untag a profile from an interface using Fabric Manager, follow these steps:
Step 1 Choose Switches > Interfaces > Gigabit Ethernet in the Physical Attributes pane.
You see the Gigabit Ethernet Configuration in the Information pane.
Step 2 Select the iSNS tab.
You see the iSNS profiles configured for these interfaces (see Figure 50-45).
Step 3 Right-click on iSNS ProfileName field that you want to untag and delete the text in that field.
Step 4 Click the Apply Changes icon to save these changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Example Scenario
The iSNS server provides uniform access control across Fibre Channel and iSCSI devices by utilizing
both Fibre Channel zoning information and iSCSI access control information and configuration. An
iSCSI initiator acting as an iSNS client only discovers devices it is allowed to access based on both sets
of access control information. Figure 50-46 provides an example of this scenario.
Zone 1 Zone 2
P1 SW-1 SW-2 P2
FC FC
IP
Network - 1
iSCSI iSCSI
TOE TOE
130914
iqn.host1 iqn.host2
In Figure 50-46, iqn.host1 and iqn.host2 are iSCSI initiators. P1 and P2 are Fibre Channel targets. The
two initiators are in different zones: Zone 1 consists of iqn.host1 and target P1, and Zone 2 consists of
iqn.host2 and target P2. iSNS server functionality is enabled on both switches, SW-1 and SW-2. The
registration process proceeds as follows:
1. Initiator iqn.host1 registers with SW-1, port Gigabitethernet2/1.
2. Initiator iqn.host2 registers with SW-2, port Gigabitethernet3/1.
3. Initiator iqn.host1 issues an iSNS query to SW-1 to determine all accessible targets.
4. The iSNS server in turn queries the Fibre Channel name server (FCNS) to obtain a list of devices
that are accessible (that is, in the same zone) by the query originator. This query yields only P1.
5. The iSNS server then queries its own database to convert the Fibre Channel devices to the
corresponding iSCSI targets. This is based on the iSCSI configuration, such as virtual-target and its
access control setting or whether the dynamic Fibre Channel target import feature is enabled or
disabled.
6. The iSNS server sends a response back to the query initiator. This response contains a list all iSCSI
portals known to the iSNS server. This means iqn.host1 can choose to log in to target P1 through
either SW-1 (at Gigabitethernet 2/1) or SW-2 (at Gigabitethernet 3/1).
7. If the initiator chooses to log in to SW-1 and later that port becomes inaccessible (for example,
Gigabitethernet 2/1 goes down), the initiator has the choice to move to connect to target P1 through
port Gigabitethernet 3/1 on SW-2 instead.
8. If the target either goes down or is removed from the zone, the iSNS server sends out an iSNS State
Change Notification (SCN) message to the initiator so that the initiator can remove the session.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you are using VRRP IPv4 addresses for discovering targets from iSNS clients, ensure that the IP
address is created using the secondary option (.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Target Discovery
iSCSI initiators discover targets by issuing queries to the iSNS server. The server supports DevGetNext
requests to search the list of targets and DevAttrQuery to determine target and portal details, such as the
IP address or port number to which to connect.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
On receiving a query request from the iSCSI client, the iSNS server queries the Fibre Channel Name
Server (FCNS) to obtain a list of Fibre Channel targets that are accessible by the querying initiator. The
result of this query depends on zoning configuration currently active and current configuration(s) of the
initiator. The iSNS server will subsequently use the iSCSI target configuration(s) (virtual target and
dynamic import configuration) to translate the Fibre Channel target to an equivalent iSCSI target. At this
stage it also applies any access control configured for the virtual target. A response message with the
target details is then sent back to the query initiator.
The iSNS server sends a consolidated response containing all possible targets and portals to the querying
initiator. For example, if a Fibre Channel target is exported as different iSCSI targets on different IPS
interfaces, the iSNS server will respond with a list of all possible iSCSI targets and portals.
In order to keep the list of targets updated, the iSNS server sends state change notifications (SCN) to the
client whenever an iSCSI target becomes reachable or unreachable. The client is then expected to
rediscover its list of accessible targets by initiating another iSNS query. Reachability of iSCSI targets
changes when any one of the following occurs:
Target goes up or down.
Dynamic import of FC target configuration changes.
Zone set changes.
Default zone access control changes.
IPS interface state changes.
Initiator configuration change makes the target accessible or inaccessible.
Note iSNS Cloud Discovery is not supported on the Cisco Fabric Switch for IBM BladeCenter and Cisco
Fabric Switch for HP c-Class BladeSystem.
When an iSNS server receives a query request, it responds with a list of available targets and the portals
through which the initiator can reach the target. The IP network configuration outside the MDS switch
may result in only a subset of Gigabit Ethernet interfaces being reachable from the initiator. To ensure
that the set of portals returned to the initiator is reachable, the iSNS server needs to know the set of
Gigabit Ethernet interfaces that are reachable from a given initiator.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The iSNS cloud discovery feature provides information to the iSNS server on the various interfaces
reachable from an initiator by partitioning the interfaces on a switch into disjointed IP clouds. This
discovery is achieved by sending messages to all other known IPS ports that are currently up and,
depending on the response (or the lack of it), determines if the remote IPS port is in the same IP network
or in a different IP network.
Cloud discovery is initiated when the following events occur:
Manual requests from the CLI initiate cloud discovery from the CLI. This action causes the
destruction of existing memberships and makes new ones.
Auto-discovery of the interface results in an interface being assigned to its correct cloud. All other
cloud members are not affected. The membership of each cloud is built incrementally and is initiated
by the following events:
A Gigabit Ethernet interface comes up. This can be a local or remote Gigabit Ethernet interface.
The IP address of a Gigabit Ethernet interface changes.
The VRRP configuration on a port changes.
The iSNS server distributes cloud and membership information across all the switches using CFS.
Therefore, the cloud membership view is the same on all the switches in the fabric.
Note For CFS distribution to operate correctly for iSNS cloud discovery, all switches in the fabric must be
running Cisco SAN-OS Release 3.0(1) or NX-OS 4.1(1b) and later.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 50-2 lists the default settings for iSCSI parameters.
Parameters Default
Number of TCP connections One per iSCSI session.
minimum-retransmit-time 300 msec.
keepalive-timeout 60 seconds.
max-retransmissions 4 retransmissions.
PMTU discovery Enabled.
pmtu-enable reset-timeout 3600 sec.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
SACK Enabled.
max-bandwidth 1 Gbps
min-available-bandwidth 70 Mbps.
round-trip-time 1 msec.
Buffer size 4096 KB.
Control TCP and data connection No packets are transmitted.
TCP congestion window monitoring Enabled.
Burst size 50 KB.
Jitter 500 microseconds.
TCP connection mode Active mode is enabled.
Fibre Channel targets to iSCSI Not imported.
Advertising iSCSI target Advertised on all Gigabit Ethernet interfaces,
subinterfaces, PortChannel interfaces, and PortChannel
subinterfaces.
iSCSI hosts mapping to virtual Fibre Dynamic mapping.
Channel hosts
Dynamic iSCSI initiators Members of the VSAN 1.
Identifying initiators iSCSI node names.
Advertising static virtual targets No initiators are allowed to access a virtual target (unless
explicitly configured).
iSCSI login authentication CHAP or none authentication mechanism.
revert-primary-port Disabled.
Header and data digest Enabled automatically when iSCSI initiators send
requests. This feature cannot be configured and is not
available in store-and-forward mode.
iSNS registration interval 60 sec (not configurable).
iSNS registration interval retries 3.
Fabric distribution Disabled.
Parameters Default
Fabric distribution Disabled.
Load balancing metric 1000.
CH A P T E R 51
Configuring IP Services
Cisco MDS 9000 Family switches can route IP traffic between Ethernet and Fibre Channel interfaces.
The IP static routing feature is used to route traffic between VSANs. To do so, each VSAN must be in a
different IP subnetwork. Each Cisco MDS 9000 Family switch provides the following services for
network management systems (NMSs):
IP forwarding on the out-of-band Ethernet interface (mgmt0) on the front panel of the supervisor
modules.
IP forwarding or in-band Fibre Channel interface using the IP over Fibre Channel (IPFC)
functionIPFC specifies how IP frames can be transported over Fibre Channel using encapsulation
techniques. IP frames are encapsulated into Fibre Channel frames so NMS information can cross the
Fibre Channel network without using an overlay Ethernet network.
IP routing (default routing and static routing)If your configuration does not need an external
router, you can configure a default route using static routing.
Switches are compliant with RFC 2338 standards for Virtual Router Redundancy Protocol (VRRP)
features. VRRP is a restartable application that provides a redundant, alternate path to the gateway
switch.
Note For information about configuring IPv6, see Chapter 54, Configuring IPv6 for Gigabit Ethernet
Interfaces.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Router
Console Out of band IP address IP
connection management 172.16.1.1 network
subnetwork
Telnet or CLI
SSH
Switch 2
DNS server
mgmt 0 GUI
(IP address:
172.16.1.2)
SNMP
Management LAN
79936
(Ethernet connection)
Note The port on the Ethernet switch to which the MDS management interface is connected should be
configured as a host port (also known as access port) instead of a switch port. Spanning tree
configuration for that port (on the Ethernet switch) should disabled. This helps avoid the delay in the
MDS management port coming up due to delay from Ethernet spanning tree processing that the Ethernet
switch would run if enabled. For Cisco Ethernet switches, use either the switchport host command in
IOS is or the set port host in Catalyst OS. Refer to the configuration guide for your Ethernet switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Before you begin to configure the management interface manually, obtain the switchs IP address and IP
subnet mask. Also make sure the console cable is connected to the console port.
To configure the mgmt0 Ethernet interface using Device Managerfor IPv6, follow these steps:
Default Gateway
You can configure a default gateway IPv4 address on your Cisco MDS 9000 Family switch.
This section includes the following topics:
About the Default Gateway, page 51-3
Configuring the Default Gateway, page 51-3
Tip If you configure the static route IP forwarding and the default-network details, these IPv4 addresses will
be used regardless of the default-gateway being enabled or disabled. If these IP addresses are configured
but not available, the switch will fall back to using the default gateway IP address, if you have configured
it. Be sure to configure IP addresses for all entries in the switch.
See the Initial Setup Routine section on page 2-2 for more information on configuring the IP addresses
for all entries in the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip If you configure the static route IP forwarding and the default network details, these IPv4 addresses will
be used regardless of the default gateway being enabled or disabled. If these IPv4 addresses are
configured and not available, the switch will fall back to using the default gateway IPv4 address, if you
have configured it. Be sure to configure IPv4 addresses for all entries in the switch if you are using IPv4.
See the Initial Setup Routine section on page 2-2 for more information on configuring the IP addresses
for all entries in the switch.
When the Ethernet interface is configured, the switch should point to the gateway router for the IP
network. The host accesses the gateway using a gateway switch. This gateway switch is configured as
the default gateway. The other switches in the fabric that are connected to the same VSAN as the gateway
switch can also be connected through the gateway switch. Every interface connected to this VSAN
should be configured with the VSAN IPv4 address of the gateway switch (see Figure 51-2).
NMS
1.1.1.10
Ethernet connection
Switch A Switch B
1.12.11.1 1.12.11.2
1.12.11.1
VSAN 1
Switch D Switch C
1.12.11.1 1.12.11.1
85476
1.12.11.4 1.12.11.3
In Figure 51-2, switch A has the IPv4 address 1.12.11.1, switch B has the IPv4 address 1.12.11.2, switch
C has the IPv4 address 1.12.11.3, and switch D has the IPv4 address 1.12.11.4. Switch A is the gateway
switch with the Ethernet connection. The NMS uses the IPv4 address 1.1.1.10 to connect to the gateway
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
switch. Frames forwarded to any switch in the overlaid VSAN 1 are routed through the gateway switch.
Configuring the gateway switchs IPv4 address (1.12.11.1) in the other switches enable the gateway
switch to forward the frame to the intended destination. Similarly, if a non-gateway switch in the VSAN
forwards a frame to the Ethernet world, the frame is routed through the gateway switch.
When forwarding is disabled (default), IP frames are not sent from one interface to another. In these
cases, the software performs local IP routing between two switches using the in-band option for Fibre
Channel traffic and the mgmt0 option for Ethernet traffic.
When a VSAN is created, a VSAN interface is not created automatically. You need to specifically create
the interface (see the VSAN Interfaces section on page 20-30).
IPFC
IPFC provides IP forwarding or in-band switch management over a Fibre Channel interface (rather than
out-of-band using the Gigabit Ethernet mgmt 0 interface). You can be use IPFC to specify that IP frames
can be transported over Fibre Channel using encapsulation techniques. IP frames are encapsulated into
Fibre Channel frames so NMS information can cross the Fibre Channel network without using an overlay
Ethernet network.
Once the VSAN interface is created, you can specify the IP address for that VSAN. You can assign an
IPv4 address or an IPv6 address.
Note See the Chapter 54, Configuring IPv6 for Gigabit Ethernet Interfaces for information about
configuring IPv6 on the Cisco MDS 9000 Family switches.
Note For information about IPv6 static routing, see the Configuring IPv6 for Gigabit Ethernet Interfaces
section on page 54-1.
Static routing is a mechanism to configure IPv4 routes on the switch. You can configure more than one
static route.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If a VSAN has multiple exit points, configure static routes to direct traffic to the appropriate gateway
switch. IPv4 routing is disabled by default on any gateway switch between the out-of-band management
interface and the default VSAN, or between directly connected VSANs.
Overlay VSANs
This section describes overlay VSANs and how to configure them.
This section includes the following topics:
About Overlay VSANs, page 51-6
Configuring Overlay VSANs, page 51-6
Step 1 Add the VSAN to the VSAN database on all switches in the fabric.
Step 2 Create a VSAN interface for the VSAN on all switches in the fabric. Any VSAN interface belonging to
the VSAN has an IP address in the same subnet. Create a route to the IPFC cloud on the IP side.
Step 3 Configure a default route on every switch in the Fibre Channel fabric pointing to the switch that provides
NMS access.
Step 4 Configure the default gateway (route) and the IPv4 address on switches that point to the NMS (see
Figure 51-3).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Physical Fibre
Channel Fabric
VSAN HR
172.23.84.74
mgmt 0
172.23.84.86
NMS
IP cloud
79544
Step 1 Add the VSAN to the VSAN database on any switch in the fabric.
Step 2 Create a VSAN interface for the appropriate VSAN on any switch in the fabric.
Step 3 Assign an IP address on every VSAN interface on the same subnet as the corresponding VSAN.
Step 4 Define the multiple static routes on the Fibre Channel switches and the IP cloud (see Figure 51-4).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Physical Fibre
Channel Fabric
route 0.0.0.0 0.0.0.0 next_hop 10.10.10.35
If vsan10 - 10.10.10.88
If vsan10 - 10.10.10.124
VSAN 10
If vsan10 - 10.10.10.35
VSAN 10 default
gateway
If vsan10 - 11.11.11.35
VSAN 11
route 10.10.10.10.0 255.255.255.0 next_hop 11.11.11.35
IP default-gateway 10.10.10.35 next_hop 11.12.12.34
If vsan11 - 11.11.11.34
VSAN 11 default
gateway If vsan11 - 11.11.11.72
172.23.84.74
172.23.84.86
NMS
IP cloud
79545
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
About VRRP
VRRP provides a redundant alternative path to the gateway switch, which has connectivity to the NMS.
VRRP has the following characteristics and advantages:
VRRP is a restartable application.
When a VRRP master fails, the VRRP backup takes over within three times the advertisement time.
VRRP over Ethernet, VRRP over VSAN, and Fibre Channel functions are implemented as defined
in RFC 2338 and the draft-ietf-vrrp-ipv6 specification.
A virtual router is mapped to each VSAN and Ethernet interface with its unique virtual router IP,
virtual router MAC, and VR ID.
Interface Mgmt 0 supports only one VRRP group. All other interface supports up to 7 virtual router
groups, including both IPv4 and IPv6 combined.
VR IDs can be reused in multiple VSANs with different virtual router IP mapping.
Both IPv4 and IPv6 is supported.
The management interface (mgmt 0) supports only one virtual router group. All other interfaces
each support up to seven virtual router groups, including both IPv4 and IPv6 combined. Up to 255
virtual router groups can be assigned in each VSAN.
VRRP security provides three options, including no authentication, simple text authentication, and
MD5 authentication.
Note If you are using IPv6, you must either configure an IPv6 address on the interface or enable IPv6
on the interface. For more information about IPv6, see Chapter 54, Configuring IPv6 for
Gigabit Ethernet Interfaces.
In Figure 51-5, switch A is the VRRP master and switch B is the VRRP backup switch. Both switches
have an IP address to VRRP mapping configured. The other switches set switch A as the default gateway.
If switch A fails, the other switches do not have to change the routing configurations as switch B
automatically becomes the master and takes over the function of a gateway.
Switch A Switch B
1.2.11.1 1.2.11.2
VRRP
VSAN 1
Switch D Switch C
85477
1.2.11.4 1.2.11.3
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In Figure 51-6, the fabric example has two virtual router groups (VR1 and VR 2) because a virtual router
cannot span across different types of interfaces. In both switch 1 and switch 2, the Ethernet interface is
in VR 1 and the FC interface is in VR 2. Each virtual router is uniquely identified by the VSAN interface
and the VR ID.
Management
appliance
Link 5
IP
network
Switch 1 Switch 5
VR1
VR2
Switch 2 Switch 4
FC Fabric
Switch 3
Redundant Gateway
IP links
FC links
Virtual Router with
79546
unique VR IP and
VR MAC
Configuring VRRP
This section describes how to configure VRRP and includes the following topics:
Adding and Deleting Virtual Router, page 51-10
Virtual Router Initiation, page 51-11
Adding Virtual Router IP Addresses, page 51-11
Setting the Priority for the Virtual Router, page 51-11
Setting the time Interval for Advertisement Packets, page 51-11
Configuring or Enabling Priority Preemption, page 51-11
Setting Virtual Router Authentication, page 51-12
Tracking the Interface Priority, page 51-12
Note The total number of VRRP groups that you can configure on a Gigabit Ethernet port, including main
interfaces and subinterfaces, cannot exceed seven. This limitation applies to both IPv4 and IPv6 groups.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose IP > VRRP. You see the Operations tab of the VRRP dialog box.
Step 2 Click the IP Addresses tab on the VRRP dialog box.
Step 3 To create a new VRRP entry, click Create. You see the Create VRRP IP Addresses window.
Step 4 Complete the fields in this window to create a new VRRP IP Address, and click OK or Apply.
Note If the virtual IP address is also the IP address for the interface, then preemption is implicitly applied.
Note The VRRP preemption is not supported on IP storage Gigabit Ethernet interfaces.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note For interface state tracking to function, you must enable preemption on the interface. See the
Configuring or Enabling Priority Preemption section on page 51-11.
Note When accessing a Telnet host, if the DNS server is not reachable (for any reason) the switch login prompt
may take a longer time to appear. If so, verify that the DNS server is accurately configured and reachable.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 51-1 lists the default settings for DNS features.
Parameters Default
Domain lookup Disabled.
Domain name Disabled.
Domains None.
Domain server None.
Maximum domain servers 6.
Parameters Default
Virtual router state Disabled.
Maximum groups per VSAN 255.
Maximum groups per Gigabit Ethernet port 7.
Priority preemption Disabled.
Virtual router priority 100 for switch with secondary IP addresses.
255 for switches with the primary IP address.
Priority interface state tracking Disabled.
Advertisement interval 1 second for IPv4.
100 centiseconds for IPv6.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 52
Configuring IP Storage
Cisco MDS 9000 Family IP storage (IPS) services extend the reach of Fibre Channel SANs by using
open-standard, IP-based technology. The switch connects separated SAN islands using Fibre Channel
over IP (FCIP), and it allows IP hosts to access Fibre Channel storage using the iSCSI protocol.
Note FCIP and iSCSI features are specific to the IPS module and are available in Cisco MDS 9200 Switches
or Cisco MDS 9500 Directors.
The Cisco MDS 9216I switch and the 14/2 Multiprotocol Services (MPS-14/2) module also allow you
to use Fibre Channel, FCIP, and iSCSI features. The MPS-14/2 module is available for use in any switch
in the Cisco MDS 9200 Series or Cisco MDS 9500 Series.
Services Modules
The IP Storage services module (IPS module) and the MPS-14/2 module allow you to use FCIP and
iSCSI features. Both modules integrate seamlessly into the Cisco MDS 9000 Family, and support the full
range of features available on other switching modules, including VSANs, security, and traffic
management. The following types of storage services modules are currently available for use in any
switch in the Cisco MDS 9200 Series or in the Cisco MDS 9500 Series:
The 4-port, hot-swappable IPS module (IPS-4) has four Gigabit Ethernet ports.
The 8-port, hot-swappable IPS module (IPS-8) has eight Gigabit Ethernet ports.
The MPS-14/2 module has 14 Fibre Channel ports (numbered 1 through 14) and two Gigabit
Ethernet ports (numbered 1 and 2).
Gigabit Ethernet ports in these modules can be configured to support the FCIP protocol, the iSCSI
protocol, or both protocols simultaneously:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FCIPFCIP transports Fibre Channel frames transparently over an IP network between two Cisco
MDS 9000 Family switches or other FCIP standards-compliant devices. Figure 52-1 shows how the
IPS module is used in different FCIP scenarios.
FC
Fabric
"Control" TCP
connection
"Data" TCP
connection
IP
network
FC FC
Fabric Fabric
91553
iSCSIThe IPS module provides IP hosts access to Fibre Channel storage devices. The IP host
sends SCSI commands encapsulated in iSCSI protocol data units (PDUs) to a Cisco MDS 9000
Family switch IPS port over a TCP/IP connection. At this point, the commands are routed from an
IP network into a Fibre Channel network and forwarded to the intended target. Figure 52-2 depicts
the iSCSI scenarios in which the IPS module is used.
iqn.host-2
FC
iSCSI
pWWW - P3
IP IP-10.1.1.1 pWWW - P2
network
Fibre
channel
pWWW - P1
iqn.host-1 fabric
iSCSI
91554
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Open the Switches folder and select Hardware in the Physical Attributes pane.
You see the status for all modules in the switch in the Information pane.
Caution A software upgrade is only disruptive for the IPS module. The NX-OS software continues to support
nondisruptive software upgrades for Fibre Channel modules in the switch and for the switch itself.
IPS modules use a rolling upgrade install mechanism where each module in a given switch can only be
upgraded in sequence. To guarantee a stable state, each IPS module in a switch requires a 5-minute delay
before the next IPS module is upgraded.
Caution A software upgrade is only partially disruptive for the MPS-14/2 module. The NX-OS software
continues to support nondisruptive software upgrades for Fibre Channel modules in the switch and for
the switch itself.
The MPS-14/2 modules have 14 Fibre Channel ports (nondisruptive upgrade) and 2 Gigabit Ethernet
ports (disruptive upgrade). MPS-14/2 modules use a rolling upgrade install mechanism for the two
Gigabit Ethernet ports where each module in a given switch can only be upgraded in sequence. To
guarantee a stable state, each MPS-14/2 module in a switch requires a 5-minute delay before the next
module is upgraded.
Supported Hardware
You can configure the FCIP and iSCSI features using one or more of the following hardware:
IPS-4 and IPS-8 modules (refer to the Cisco MDS 9200 Series Hardware Installation Guide or the
Cisco MDS 9500 Series Hardware Installation Guide for more information)
MPS-14/2 module (refer to the Cisco MDS 9200 Series Hardware Installation Guide or the Cisco
MDS 9500 Series Hardware Installation Guide for more information).
Note In both the MPS-14/2 module and the Cisco MDS 9216i integrated supervisor module, the port
numbering differs for the Fibre Channel ports and the Gigabit Ethernet ports. The Fibre Channel
ports are numbered from 1 through 14 and the Gigabit Ethernet ports are numbered 1 and 2.
Cisco MDS 9216i Switch (refer to the Cisco MDS 9200 Series Hardware Installation Guide).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note For information about configuring FCIP, see Chapter 5, Fabric Manager Client. For information about
configuring iSCSI, see Chapter 50, Configuring iSCSI.
A new port mode, called IPS, is defined for Gigabit Ethernet ports on each IPS module or MPS-14/2
module. IP storage ports are implicitly set to IPS mode, so it can only be used to perform iSCSI and FCIP
storage functions. IP storage ports do not bridge Ethernet frames or route other IP packets.
Each IPS port represents a single virtual Fibre Channel host in the Fibre Channel SAN. All the iSCSI
hosts connected to this IPS port are merged and multiplexed through the single Fibre Channel host.
In large scale iSCSI deployments where the Fibre Channel storage subsystems require explicit LUN
access control for every host device, use of proxy-initiator mode simplifies the configuration.
Note The Gigabit Ethernet interfaces on the MPS-14/2 module do not support EtherChannel.
Note To configure IPv6 on a Gigabit Ethernet interface, see the Gigabit Ethernet IPv6-ACL Guidelines
section on page 54-14.
Tip Gigabit Ethernet ports on any IPS module or MPS-14/2 module should not be configured in the same
Ethernet broadcast domain as the management Ethernet portthey should be configured in a different
broadcast domain, either by using separate standalone hubs or switches or by using separate VLANs.
Switch 1 IP host
IP router
10.1.1.100/24 10.100.1.1/24
91555
10.1.1.1/24 10.100.1.25/24
Note The port on the Ethernet switch to which the MDS Gigabit Ethernet interface is connected should be
configured as a host port (also known as access port) instead of a switch port. Spanning tree
configuration for that port (on the ethernet switch) should disabled. This helps avoid the delay in the
management port coming up due to delay from Ethernet spanning tree processing that the Ethernet
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
switch would run if enabled. For Cisco Ethernet switches, use either the switchport host command in
Cisco IOS is or the set port host in Catalyst OS. Refer to the configuration guide for your Ethernet
switch.
To configure the Gigabit Ethernet interface for the scenario in Figure 52-3, follow these steps:
Step 1 From Fabric Manager, choose Switches > Interfaces > Gigabit Ethernet in the Physical Attributes
pane. You see the Gigabit Ethernet configuration in the Information pane.
From Device Manager, right-click the Gigabit Ethernet port that you want to configure and choose
Configure.... You see the Gigabit Ethernet configuration dialog box.
Step 2 Click the General tab in Fabric Manager, or click the GigE tab in Device Manager to display the general
configuration options for the interface.
Step 3 Set the description and MTU value for the interface. The valid value for the MTU field can be a number
in the range from 576 to 9000.
Step 4 Set Admin up or down and check the CDP check box if you want this interface to participate in CDP.
Step 5 Set IpAddress/Mask with the IP address and subnet mask for this interface.
Step 6 From Fabric Manager, click the Apply Changes icon to save these changes, or click the Undo Changes
icon to discard changes.
From Device Manager, click Apply to save these changes, or click Close to discard changes and close
the Gigabit Ethernet configuration dialog box.
Configuring Autonegotiation
By default, autonegotiation is enabled all Gigabit Ethernet interface. You can enable or disable
autonegotiation for a specified Gigabit Ethernet interface. When autonegotiation is enabled, the port
automatically detects the speed or pause method, and duplex of incoming signals based on the link
partner. You can also detect link up conditions using the autonegotiation feature.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip MTU changes are disruptive, all FCIP links and iSCSI sessions flap when the software detects a change
in the MTU size.
Same Subnet
Interface 1 Interface 2 Allowed Notes
Gigabit Ethernet 1/1 Gigabit Ethernet 1/2 Yes Two major interfaces can be configured in the same
or different subnets.
Gigabit Ethernet 1/1.100 Gigabit Ethernet 1/2.100 Yes Two subinterfaces with the same VLAN ID can be
configured in the same or different subnets.
Gigabit Ethernet 1/1.100 Gigabit Ethernet 1/2.200 No Two subinterfaces with different VLAN IDs cannot
be configured in the same subnet.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Same Subnet
Interface 1 Interface 2 Allowed Notes
Gigabit Ethernet 1/1 Gigabit Ethernet 1/1.100 No A subinterface cannot be configured on the same
subnet as the major interface.
mgmt0 Gigabit Ethernet 1/1.100 No The mgmt0 interface cannot be configured in the
mgmt0 Gigabit Ethernet 1/1 No same subnet as the Gigabit Ethernet interfaces or
subinterfaces.
Note The configuration requirements in Table 52-1 also apply to Ethernet PortChannels.
Note If the connection fails, verify the following, and ping the IP host again:
- The IP address for the destination (IP host) is correctly configured.
- The host is active (powered on).
- The IP route is configured correctly.
- The IP host has a route to get to the Gigabit Ethernet interface subnet.
- The Gigabit Ethernet interface is in the up state.
Tip If IPv4-ACLs are already configured in a Gigabit Ethernet interface, you cannot add this interface to an
Ethernet PortChannel group.
Follow these guidelines when configuring IPv4-ACLs for Gigabit Ethernet interfaces:
Only use Transmission Control Protocol (TCP) or Internet Control Message Protocol (ICMP).
Note Other protocols such as User Datagram Protocol (UDP) and HTTP are not supported in
Gigabit Ethernet interfaces. Applying an ACL that contains rules for these protocols to a
Gigabit Ethernet interface is allowed but those rules have no effect.
Apply IPv4-ACLs to the interface before you enable an interface. This ensures that the filters are in
place before traffic starts flowing.
Be aware of the following conditions:
If you use the log-deny option, a maximum of 50 messages are logged per second.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The established, precedence, and fragments options are ignored when you apply IPv4-ACLs
(containing these options) to Gigabit Ethernet interfaces.
If an IPv4-ACL rule applies to a preexisting TCP connection, that rule is ignored. For example
if there is an existing TCP connection between A and B, and an IPv4-ACL specifies dropping
all packets whose source is A and destination is B is subsequently applied, it will have no effect.
Switch 1
VRRP group
10.1.1.10 virtual IP 10.1.1.100
VRRP master
IPS module Connect to
L2 switch
10.1.1.100
IP network
IPS module
10.1.1.30
VRRP backup
90855
Switch 2
In Figure 52-4, all members of the VRRP group must be IP storage Gigabit Ethernet ports. VRRP group
members can be one or more of the following interfaces:
One or more interfaces in the same IPS module or MPS-14/2 module
Interfaces across IPS modules or MPS-14/2 modules in one switch
Interfaces across IPS modules or MPS-14/2 modules in different switches
Gigabit Ethernet subinterfaces
Ethernet PortChannels and PortChannel subinterfaces
See the Virtual Router Redundancy Protocol section on page 51-8.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The VRRP preempt option is not supported on IPS Gigabit Ethernet interfaces. However, if the virtual
IPv4 address is also the IPv4 address for the interface, then preemption is implicitly applied.
Note If you configure secondary VRRP IPv6 addresses on an IPFC VSAN interface, before a downgrading to
a release prior to Cisco Release 3.0(1), you must remove the secondary VRRP IPv6 addresses. This is
required only when you configure IPv6 addresses.
Note The Cisco Ethernet switchs PortChannel should be configured as a static PortChannel, and not the
default 802.3ad protocol.
Ethernet PortChannels can only aggregate two physical interfaces that are adjacent to each other on a
given IPS module (see Figure 52-5).
Note PortChannel members must be one of these combinations: ports 12, ports 34, ports 56, or ports 78.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Switch 1
Ethernet PortChannel
aggregation
L2 switch
IPS module
90856
In Figure 52-5, Gigabit Ethernet ports 3 and 4 in slot 9 are aggregated into an Ethernet PortChannel.
Ethernet PortChannels are not supported on MPS-14/2 modules and 9216i IPS modules.
Note PortChannel interfaces provide configuration options for both Gigabit Ethernet and Fibre Channel.
However, based on the PortChannel membership, only Gigabit Ethernet parameters or Fibre Channel
parameters are applicable.
Note Gigabit Ethernet interfaces cannot be added to a PortChannel if one of the following cases apply:
- The interface already has an IP address assigned.
- The subinterfaces are configured on that interface.
- The interface already has an associated IPv4-ACL rule and the PortChannel does not.
Configuring CDP
The Cisco Discovery Protocol (CDP) is supported on the management Ethernet interface on the
supervisor module and the Gigabit Ethernet interfaces on the IPS module or MPS-14/2 module.
See the Configuring CDP section on page 12-12.
Default Settings
Table 52-2 lists the default settings for IP storage services parameters.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
IPS core size Partial
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 53
Configuring IPv4 for Gigabit Ethernet Interfaces
Cisco MDS 9000 Family supports IP version 4 (IPv4) on Gigabit Ethernet interfaces. This chapter
describes how to configure IPv4 addresses and other IPv4 features.
This chapter includes the following topics:
About IPv4, page 53-1
Basic Gigabit Ethernet Configuration for IPv4, page 53-2
VLANs, page 53-4
IPv4-ACLs, page 53-6
Default Settings, page 53-6
About IPv4
Both FCIP and iSCSI rely on TCP/IP for network connectivity. On each IPS module or MPS-14/2
module, connectivity is provided in the form of Gigabit Ethernet interfaces that are appropriately
configured. This section covers the steps required to configure IP for subsequent use by FCIP and iSCSI.
Note For information about configuring FCIP, see Chapter 48, Configuring FCIP. For information about
configuring iSCSI, see Chapter 50, Configuring iSCSI.
A new port mode, called IPS, is defined for Gigabit Ethernet ports on each IPS module or MPS-14/2
module. IP storage ports are implicitly set to IPS mode, so it can only be used to perform iSCSI and FCIP
storage functions. IP storage ports do not bridge Ethernet frames or route other IP packets.
Each IPS port represents a single virtual Fibre Channel host in the Fibre Channel SAN. All the iSCSI
hosts connected to this IPS port are merged and multiplexed through the single Fibre Channel host.
In large scale iSCSI deployments where the Fibre Channel storage subsystems require explicit LUN
access control for every host device, use of proxy-initiator mode simplifies the configuration.
Note The Gigabit Ethernet interfaces on the MPS-14/2 module do not support EtherChannel.
Note To configure IPv6 on a Gigabit Ethernet interface, see the Configuring IPv6 Addressing and Enabling
IPv6 Routing section on page 54-11.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip Gigabit Ethernet ports on any IPS module or MPS-14/2 module should not be configured in the same
Ethernet broadcast domain as the management Ethernet port. They should be configured in a different
broadcast domain, either by using separate standalone hubs or switches or by using separate VLANs.
Switch 1 IP host
IP router
10.1.1.100/24 10.100.1.1/24
91555
10.1.1.1/24 10.100.1.25/24
Note The port on the Ethernet switch to which the MDS Gigabit Ethernet interface is connected should be
configured as a host port (also known as access port) instead of a switch port. Spanning tree
configuration for that port (on the Ethernet switch) should be disabled. This helps avoid the delay in the
management port coming up due to delay from Ethernet spanning tree processing that the Ethernet
switch would run if enabled. For Cisco Ethernet switches, use either the switchport host command in
Cisco IOS is or the set port host in Catalyst OS. Refer to the configuration guide for your Ethernet
switch.
To configure the Gigabit Ethernet interface using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Configuring Autonegotiation
By default, autonegotiation is enabled all Gigabit Ethernet interface. You can enable or disable
autonegotiation for a specified Gigabit Ethernet interface. When autonegotiation is enabled, the port
automatically detects the speed or pause method, and duplex of incoming signals based on the link
partner. You can also detect link up conditions using the autonegotiation feature.
To configure autonegotiation using Fabric Manager, follow these steps:
Tip MTU changes are disruptive, all FCIP links and iSCSI sessions flap when the software detects a change
in the MTU size.
To configure the MTU frame size using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 In the General tab, in the Mtu column, you can enter a new value to configure the MTU Frame Size for
a specific switch. For example 3000 bytes. The default is 1500 bytes.
Step 3 Click Apply Changes.
VLANs
This section describes virtual LAN (VLAN) support in Cisco MDS NX-OS and includes the following
topics:
About VLANs for Gigabit Ethernet, page 53-4
Configuring the VLAN Subinterface, page 53-5
Interface Subnet Requirements, page 53-5
Note If the IPS module or MPS-14/2 module is connected to a Cisco Ethernet switch, and you need to have
traffic from multiple VLANs coming to one IPS port, verify the following requirements on the Ethernet
switch:
- The Ethernet switch port connected to the IPS module or MPS-14/2 module is configured as a trunking
port.
- The encapsulation is set to 802.1Q and not ISL, which is the default.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Use the VLAN ID as a subscription to the Gigabit Ethernet interface name to create the subinterface
name (the <slot-number>/<port-number>.<VLAN-ID>).
Same Subnet
Interface 1 Interface 2 Allowed Notes
Gigabit Ethernet 1/1 Gigabit Ethernet 1/2 Yes Two major interfaces can be configured in the same
or different subnets.
Gigabit Ethernet 1/1.100 Gigabit Ethernet 1/2.100 Yes Two subinterfaces with the same VLAN ID can be
configured in the same or different subnets.
Gigabit Ethernet 1/1.100 Gigabit Ethernet 1/2.200 No Two subinterfaces with different VLAN IDs cannot
be configured in the same subnet.
Gigabit Ethernet 1/1 Gigabit Ethernet 1/1.100 No A subinterface cannot be configured on the same
subnet as the major interface.
mgmt0 Gigabit Ethernet 1/1.100 No The mgmt0 interface cannot be configured in the
mgmt0 Gigabit Ethernet 1/1 No same subnet as the Gigabit Ethernet interfaces or
subinterfaces.
Note The configuration requirements in Table 53-1 also apply to Ethernet PortChannels.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
IPv4-ACLs
This section describes the guidelines for IPv4 access control lists (IPv4-ACLs) and how to apply them
to Gigabit Ethernet interfaces.
Note For information on creating IPv4-ACLs, see Chapter 42, Configuring IPv4 and IPv6 Access Control
Lists.
Note Other protocols such as User Datagram Protocol (UDP) and HTTP are not supported in
Gigabit Ethernet interfaces. Applying an ACL that contains rules for these protocols to a
Gigabit Ethernet interface is allowed but those rules have no effect.
Apply IPv4-ACLs to the interface before you enable an interface. This ensures that the filters are in
place before traffic starts flowing.
Be aware of the following conditions:
If you use the log-deny option, a maximum of 50 messages are logged per second.
The established option is ignored when you apply IPv4-ACLs containing this option to Gigabit
Ethernet interfaces.
If an IPv4-ACL rule applies to a pre-existing TCP connection, that rule is ignored. For example
if there is an existing TCP connection between A and B and an IPv4-ACL which specifies
dropping all packets whose source is A and destination is B is subsequently applied, it will have
no effect.
Tip If IPv4-ACLs are already configured in a Gigabit Ethernet interface, you cannot add this interface to an
Ethernet PortChannel group. See Configuring IPv4 for Gigabit Ethernet Interfaces, page 53-1 for
information on configuring IPv4-ACLs.
Default Settings
Table 53-2 lists the default settings for IPv4 parameters.
Parameters Default
IPv4 MTU frame size 1500 bytes for all Ethernet ports.
Autonegotiation Enabled.
Promiscuous mode Disabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 54
Configuring IPv6 for Gigabit Ethernet Interfaces
IP version 6 (IPv6) provides extended addressing capability beyond those provided in IP version 4 (IPv4)
in Cisco MDS NX-OS. The architecture of IPv6 has been designed to allow existing IPv4 users to
transition easily to IPv6 while providing services such as end-to-end security, quality of service (QoS),
and globally unique addresses.
This chapter includes the following sections:
About IPv6, page 54-1
Configuring Basic Connectivity for IPv6, page 54-11
Configuring IPv6 Static Routes, page 54-13
Gigabit Ethernet IPv6-ACL Guidelines, page 54-14
Transitioning from IPv4 to IPv6, page 54-15
Default Settings, page 54-15
Note For Cisco NX-OS features that use IP addressing, refer to the chapters in this guide that describe those
features for information on IPv6 addressing support.
Note To configure IP version 4 (IPv4) on a Gigabit Ethernet interface, see Chapter 53, Configuring IPv4 for
Gigabit Ethernet Interfaces.
About IPv6
IPv6 provides the following enhancements over IPv4:
Allows networks to scale and provide global reachability.
Reduces the need for private address and network address translation (NAT).
Provides simpler autoconfiguration of addresses.
This section describes the IPv6 features supported by Cisco MDS NX-OS and includes the following
topics:
Extended IPv6 Address Space for Unique Addresses, page 54-2
IPv6 Address Formats, page 54-2
IPv6 Address Prefix Format, page 54-3
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Two colons (::) can be used only once in an IPv6 address to represent the longest successive hexadecimal
fields of zeros.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Global Addresses
Global IPv6 addresses are defined by a global routing prefix, a subnet ID, and an interface ID.
Figure 54-1 shows the structure of a global address.
147996
Global routing prefix SLA Interface ID
001
Addresses with a prefix of 2000::/3 (001) through E000::/3 (111) are required to have 64-bit interface
identifiers in the extended universal identifier (EUI)-64 format. The Internet Assigned Numbers
Authority (IANA) allocates the IPv6 address space in the range of 2000::/16 to regional registries.
The aggregatable global address typically consists of a 48-bit global routing prefix and a 16-bit subnet
ID or Site-Level Aggregator (SLA). In the IPv6 aggregatable global unicast address format document
(RFC 2374), the global routing prefix included two other hierarchically structured fields named
Top-Level Aggregator (TLA) and Next-Level Aggregator (NLA).The IETF decided to remove the TLS
and NLA fields from the RFCs because these fields are policy-based. Some existing IPv6 networks
deployed before the change might still be using networks based on the older architecture.
A 16-bit subnet field called the subnet ID could be used by individual organizations to create their own
local addressing hierarchy and to identify subnets. A subnet ID is similar to a subnet in IPv4, except that
an organization with an IPv6 subnet ID can support up to 65,535 individual subnets.
An interface ID is used to identify interfaces on a link. The interface ID must be unique to the link. They
may also be unique over a broader scope. In many cases, an interface ID will be the same as, or based
on, the link-layer address of an interface, which results in a globally unique interface ID. Interface IDs
used in aggregatable global unicast and other IPv6 address types must be 64 bits long and constructed
in the modified EUI-64 format.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Cisco MDS NX-OS supports IEEE 802 interface types (for example, Gigabit Ethernet interfaces). The
first three octets (24 bits) are taken from the Organizationally Unique Identifier (OUI) of the 48-bit
link-layer address (MAC address) of the interface, the fourth and fifth octets (16 bits) are a fixed
hexadecimal value of FFFE, and the last three octets (24 bits) are taken from the last three octets of the
MAC address. The construction of the interface ID is completed by setting the Universal/Local (U/L)
bitthe seventh bit of the first octetto a value of 0 or 1. A value of 0 indicates a locally administered
identifier; a value of 1 indicates a globally unique IPv6 interface identifier (see Figure 54-2).
00 90 27 17 FC 0F
00 90 27 17 FC 0F
FF FE
00 90 27 FF FE 17 FC 0F
U=0
000000U0 Where U is 0 (not unique)
or 1 (unique)
U=1
144884
02 90 27 FF FE 17 FC 0F
Link-Local Address
A link-local address is an IPv6 unicast address that is automatically configured on an interface using the
link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Link-local
addresses are used in the neighbor discovery protocol and the stateless autoconfiguration process. Nodes
on a local link can use link-local addresses to communicate. Figure 54-3 shows the structure of a
link-local address.
128 bits
0 Interface ID
1111 1110 10
FE80::/10
52669
10 bits
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
128 bits
0 Interface ID
4 bits 4 bits
1111 1111
0 if permanent
F F Lifetime Scope Lifetime =
1 if temporary
1 = node
8 bits 8 bits 2 = link
Scope = 5 = site
8 = organization
52671
E = global
IPv6 hosts are required to join (receive packets destined for) the following multicast groups:
All-node multicast group FF02::1.
Solicited-node multicast group FF02:0:0:0:0:1:FF00:0000/104 concatenated with the low-order 24
bit of the unicast address.
The solicited-node multicast address is a multicast group that corresponds to an IPv6 unicast
address. IPv6 nodes must join the associated solicited-node multicast group for every unicast
address to which it is assigned. The IPv6 solicited-node multicast address has the prefix
FF02:0:0:0:0:1:FF00:0000/104 concatenated with the 24 low-order bits of a corresponding IPv6
unicast address. (See Figure 54-5.) For example, the solicited-node multicast address corresponding
to the IPv6 address 2037::01:800:200E:8C6C is FF02::1:FF0E:8C6C. Solicited-node addresses are
used in neighbor solicitation messages.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
128 bits
52672
Note There are no broadcast addresses in IPv6. IPv6 multicast addresses are used instead of broadcast
addresses.
ICMPv6 data
147997
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note In IPv4, the minimum link MTU is 68 octets, which means that the MTU size of every link along a given
data path must support an MTU size of at least 68 octets.
In IPv6, the minimum link MTU is 1280 octets. We recommend using an maximum transmission unit
(MTU) value of 1500 octets for IPv6 links.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
147979
A and B can now exchange
packets on this link
After receiving the neighbor solicitation message, the destination node replies by sending a neighbor
advertisement message, which has a value of 136 in the Type field of the ICMP packet header, on the
local link. The source address in the neighbor advertisement message is the IPv6 address of the node
(more specifically, the IPv6 address of the node interface) sending the neighbor advertisement message.
The destination address in the neighbor advertisement message is the IPv6 address of the node that sent
the neighbor solicitation message. The data portion of the neighbor advertisement message includes the
link-layer address of the node sending the neighbor advertisement message.
After the source node receives the neighbor advertisement, the source node and destination node can
communicate.
Neighbor solicitation messages are also used to verify the reachability of a neighbor after the link-layer
address of a neighbor is identified. When a node wants to verifying the reachability of a neighbor, the
destination address in a neighbor solicitation message is the unicast address of the neighbor.
Neighbor advertisement messages are also sent when there is a change in the link-layer address of a node
on a local link. When there is such a change, the destination address for the neighbor advertisement is
the all-node multicast address.
Neighbor solicitation messages are also used to verify the reachability of a neighbor after the link-layer
address of a neighbor is identified. Neighbor unreachability detection identifies the failure of a neighbor
or the failure of the forward path to the neighbor, and is used for all paths between hosts and neighboring
nodes (hosts or routers). Neighbor unreachability detection is performed for neighbors to which only
unicast packets are being sent and is not performed for neighbors to which multicast packets are being
sent.
A neighbor is considered reachable when the neighbor returns a positive acknowledgment indicating that
it has received and processed packets previously sent to it. A positive acknowledgment could be from an
upper-layer protocol such as TCP indicating that a connection is making forward progress (reaching its
destination) or the receipt of a neighbor advertisement message in response to a neighbor solicitation
message. If packets are reaching the peer, they are also reaching the next-hop neighbor of the source.
Therefore, forward progress is also a confirmation that the next-hop neighbor is reachable.
For destinations that are not on the local link, forward progress implies that the first-hop router is
reachable. When acknowledgments from an upper-layer protocol are not available, a node probes the
neighbor using unicast neighbor solicitation messages to verify that the forward path is still working.
The return of a solicited neighbor advertisement message from the neighbor is a positive
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
acknowledgment that the forward path is still working (neighbor advertisement messages that have the
solicited flag set to a value of 1 are sent only in response to a neighbor solicitation message). Unsolicited
messages confirm only the one-way path from the source to the destination node; solicited neighbor
advertisement messages indicate that a path is working in both directions.
Note A neighbor advertisement message that has the solicited flag set to a value of 0 must not be considered
as a positive acknowledgment that the forward path is still working.
Neighbor solicitation messages are also used in the stateless autoconfiguration process to verify the
uniqueness of unicast IPv6 addresses before the addresses are assigned to an interface. Duplicate address
detection is performed first on a new, link-local IPv6 address before the address is assigned to an
interface (the new address remains in a tentative state while duplicate address detection is performed).
Specifically, a node sends a neighbor solicitation message with an unspecified source address and a
tentative link-local address in the body of the message. If another node is already using that address, the
node returns a neighbor advertisement message that contains the tentative link-local address. If another
node is simultaneously verifying the uniqueness of the same address, that node also returns a neighbor
solicitation message. If no neighbor advertisement messages are received in response to the neighbor
solicitation message and no neighbor solicitation messages are received from other nodes that are
attempting to verify the same tentative address, the node that sent the original neighbor solicitation
message considers the tentative link-local address to be unique and assigns the address to the interface.
Every IPv6 unicast address (global or link-local) must be checked for uniqueness on the link; however,
until the uniqueness of the link-local address is verified, duplicate address detection is not performed on
any other IPv6 addresses associated with the link-local address.
Router Discovery
Router discovery performs both router solicitation and router advertisement. Router solicitations are sent
by hosts to all-routers multicast addresses. Router advertisements are sent by routers in response to
solicitations or unsolicited and contain default router information as well as additional parameters such
as the MTU and hop limit.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
52676
MAC address:
00:2c:04:00:FF:56
Host autoconfigured
address is: Sends network-type
prefix received + interface ID information
(prefix, default route, and so on)
A node on the link can automatically configure site-local and global IPv6 addresses by appending its
interface identifier (64 bits) to the prefixes (64 bits) included in the RA messages. The resulting 128-bit
IPv6 addresses configured by the node are then subjected to duplicate address detection to ensure their
uniqueness on the link. If the prefixes advertised in the RA messages are globally unique, then the IPv6
addresses configured by the node are also guaranteed to be globally unique. Router solicitation
messages, which have a value of 133 in the Type field of the ICMP packet header, are sent by hosts at
system startup so that the host can immediately autoconfigure without needing to wait for the next
scheduled RA message.
A new API has been defined to support both IPv4 and IPv6 addresses and DNS requests. An application
can be upgraded to the new API and still use only the IPv4 protocol stack. The Cisco MDS NX-OS
supports the dual IPv4 and IPv6 protocol stack technique. When an interface is configured with both an
IPv4 and an IPv6 address, the interface will accept and process both IPv4 and IPv6 traffic.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In Figure 54-10, an application that supports dual IPv4 and IPv6 protocol stacks requests all available
addresses for the destination host name www.a.com from a DNS server. The DNS server replies with all
available addresses (both IPv4 and IPv6 addresses) for www.a.com. The application chooses an
addressin most cases, IPv6 addresses are the default choiceand connects the source node to the
destination using the IPv6 protocol stack.
www.example.com
=*? IPv4
3ffe:yyyy::1 10.1.1.1
10.1.1.1
DNS
52684
server IPv6
3ffe:yyyy::1
Note The IPv6 address must be in the form documented in RFC 2373, where the address is specified in
hexadecimal using 16-bit values between colons.
The IPv6 prefixmust be in the form documented in RFC 2373, where the address is specified in
hexadecimal using 16-bit values between colons.
The IPv6 prefix lengthis a decimal value that indicates how many of the high-order contiguous bits of
the address comprise the prefix (the network portion of the address). A slash mark must precede the
decimal value.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Configuring a global IPv6 address on an interface automatically configures a link-local address and
activates IPv6 for that interface. Additionally, the configured interface automatically joins the following
required multicast groups for that link:
Solicited-node multicast group FF02:0:0:0:0:1:FF00::/104 for each unicast address assigned to the
interface
All-node link-local multicast group FF02::1
Note The solicited-node multicast address is used in the neighbor discovery process.
Note The maximum number of IPv6 addresses (static and autoconfigured) allowed on an interface is eight,
except on the management (mgmt 0) interface where only one static IPv6 address can be configured.
To configure an IPv6 address on an interface using Device Manager, follow these steps:
Step 2 Click the IP Address that you want to configure and click Edit IP Address.
You see the IP Address dialog box.
Step 3 Click Create and set the IP Address/Mask field, using the IPv6 format (for example,
2001:0DB8:800:200C::417A/64).
Step 4 Click Create to save these changes or click Close to discard any unsaved changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose IP > Routing. You see the IP Routing Configuration dialog box. (see Figure 54-11).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To configure a IPv6 static route using Device Manager, follow these steps:
Tip If IPv6-ACLs are already configured in a Gigabit Ethernet interface, you cannot add this interface to a
Ethernet PortChannel group. See Chapter 42, Configuring IPv4 and IPv6 Access Control Lists for
information on configuring IPv6-ACLs.
Follow these guidelines when configuring IPv6-ACLs for Gigabit Ethernet interfaces:
Only use Transmission Control Protocol (TCP) or Internet Control Message Protocol (ICMP).
Note Other protocols such as User Datagram Protocol (UDP) and HTTP are not supported in
Gigabit Ethernet interfaces. Applying an ACL that contains rules for these protocols to a
Gigabit Ethernet interface is allowed but those rules have no effect.
Apply IPv6-ACLs to the interface before you enable an interface. This ensures that the filters are in
place before traffic starts flowing.
Be aware of the following conditions:
If you use the log-deny option, a maximum of 50 messages are logged per second.
The established option is ignored when you apply IPv6-ACLs containing this option to Gigabit
Ethernet interfaces.
If an IPv6-ACL rule applies to a preexisting TCP connection, that rule is ignored. For example,
if there is an existing TCP connection between A and B and an IPv6-ACL that specifies
dropping all packets whose source is A and destination is B is subsequently applied, it will have
no effect.
See Chapter 42, Configuring IPv4 and IPv6 Access Control Lists for information on applying
IPv6-ACLs to an interface.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 54-2 lists the default settings for IPv6 parameters.
Parameters Default
IPv6 processing Disabled.
Duplicate address detection 0 (neighbor discovery disabled).
attempts
Reachability time 1000 milliseconds.
Retransmission time 30000 milliseconds.
IPv6-ACLs None.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PA R T 7
CH A P T E R 55
Configuring SCSI Flow Services and Statistics
Intelligent Storage Services are features supported on the Storage Services Module (SSM). The Storage
Services Module (SSM) supports SCSI flow services and SCSI flow statistics. Intelligent Storage
Services supported in Cisco MDS SAN-OS Release 2.0(2b) or Cisco NX-OS 4.1(1b) and later include
the following topics:
SCSI Flow Services, page 55-1
SCSI Flow Statistics, page 55-6
Default Settings, page 55-8
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Supervisor Supervisor
SSM SSM
120994
Ports Ports
Initiator Target
Note The SCSI target and initiator must be connected to different SSMs on different switches.
Note For statistics monitoring, the target device is not required to be connected to an SSM.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Fibre Channel write acceleration can only be provisioned on the entire SSM, not a group of interfaces
on the SSM.
To enable Intelligent Storage Services for an SSM and provision all ports or a group of ports to use these
services using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand End Devices and then select SSM Features in the Physical Attributes pane.
You see the Intelligent Storage Services configuration in the Information pane.
Step 2 Click the SSM tab.
You see the set of configured services in the Information pane shown in Figure 55-2.
Step 4 Select the switch and SSM card you want to configure.
Step 5 (Optional) Uncheck the Use All Ports on Module check box if you want to provision a subset of the
ports on the card to use this service.
Step 6 Select the port range you want to provision for using this service (starting port and ending port).
Note The port range must be a multiple of four (for example fc4/1 through fc4-12).
Step 7 Select the feature you want to enable on these ports from the drop-down list of services.
Step 8 Set the PartnerImageURI field if you are enabling a third-party application that requires an image loaded
onto the SSM.
Step 9 Click Create to create this row and enable this service.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand End Devices and then select SSM Features in the Physical Attributes pane.
You see the Intelligent Storage Services configuration, showing the FCWA tab in the Information pane
shown in Figure 55-4.
Step 2 Click Create Row in the Information pane to create a SCSI flow or click a row in the FCWA table to
modify an existing SCSI flow.
You see the FC Write Acceleration dialog box shown in Figure 55-5.
Step 3 Select the initiator and target WWNs and VSAN IDs and check the WriteAcc check box to enable Fibre
Channel write acceleration on this SCSI flow.
Step 4 (Optional) Enable SCSI flow statistics on this SCSI flow by checking the Enable Statistics check box.
Step 5 (Optional) Change the BufCount value to set the number of 2K buffers used by the SCSI target.
Step 6 Click Create to create this SCSI flow.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand End Devices and then select SSM Features in the Physical Attributes pane.
You see the Intelligent Storage Services configuration in the Information pane.
Step 2 Click the SSM tab.
You see the set of configured services in the Information pane shown in Figure 55-2.
Step 3 Select the row in the table that you want to disable.
Step 4 (Optional) Check the Reboot Module on Delete check box if you want to force the card to reboot after
disabling the service. This is equivalent to the CLI force option.
Step 5 Click Delete Row. The ports that were provisioned for this service become available for provisioning in
another service.
Note If Reboot Module on Delete was checked, then the SSM module reboots.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The SCSI flow statistics feature requires the Enterprise Package license installed only on the initiator
switches.
Note For SCSI flow statistics, the initiator must connect to an SSM on a Cisco MDS switch while the target
can connect to any other switch in the fabric. The SCSI flow initiator and target cannot connect to the
same switch.
Step 1 Expand End Devices and then select SSM Features in the Physical Attributes pane.
You see the FCWA tab in the Information pane.
Step 2 Click Create Row in the Information pane to create a SCSI flow or click a row in the FCWA table to
modify an existing SCSI flow.
You see the FC Write Acceleration dialog box shown in Figure 55-5.
Step 3 Select the initiator and target WWNs and VSAN IDs and check the Enable Statistics check box to
enable SCSI flow statistics on this SCSI flow.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 (Optional) Enable Fibre Channel write acceleration on this SCSI flow at this time by checking the
WriteAcc check box.
Step 5 Click Create to create this SCSI flow.
Default Settings
Table 55-1 lists the default settings for SCSI flow services and SCSI flow statistics parameters.
Parameters Default
SCSI flow services Disabled.
SCSI flow services distribution Enabled.
SCSI flow statistics Disabled.
CH A P T E R 56
Configuring Fibre Channel Write Acceleration
The Storage Services Module (SSM) supports Fibre Channel write acceleration on Cisco MDS 9000
Family switches running Cisco MDS SAN-OS Release 2.0(2b) and later or Cisco NX-OS 4.1(3a).
This chapter includes the following sections:
Fibre Channel Write Acceleration, page 56-1
Default Settings, page 56-3
Note The Fibre Channel write acceleration feature requires the Enterprise Package license installed on both
the initiator and target switches.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The initiator and target cannot connect to the same Cisco MDS switch. Fibre Channel write acceleration
requires that the initiator and target must each connect to an SSM module installed on different Cisco
MDS switches.
Step 1 Expand End Devices and then select SSM Features from the Physical Attributes pane.
You see the Intelligent Storage Services configuration, showing the FCWA tab in the Information pane
(see Figure 56-1).
Step 2 Click Create Row in the Information pane to create a SCSI flow or click a row in the FCWA table to
modify an existing SCSI flow.
You see the FC Write Acceleration dialog box shown in Figure 56-2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select the initiator and target WWNs and VSAN IDs and check the WriteAcc check box to enable Fibre
Channel write acceleration on this SCSI flow.
Step 4 (Optional) Enable SCSI flow statistics on this SCSI flow at this time by checking the Enable Statistics
check box.
Step 5 (Optional) Set the BufCount value to the number of 2K buffers used by the SCSI target.
Step 6 Click Create to create this SCSI flow with Fibre Channel write acceleration.
Default Settings
Table 56-1 lists the default settings for Fibre Channel write acceleration parameters.
Parameters Default
Fibre Channel write acceleration Disabled.
Fibre Channel write acceleration buffers 1024.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
PA R T 8
CH A P T E R 57
Network Monitoring
The primary purpose of Fabric Manager is to manage the network. In particular, SAN discovery and
network monitoring are two of its key network management capabilities.
This chapter contains the following sections:
SAN Discovery and Topology Mapping, page 57-1
Health and Event Monitoring, page 57-4
Device Discovery
Once Fabric Manager is invoked, a SAN discovery process begins. Using information polled from a seed
Cisco MDS 9000 Family switch, including Name Server registrations, Fibre Channel Generic Services
(FC-GS), Fabric Shortest Path First (FSPF), and SCSI-3, Fabric Manager automatically discovers all
devices and interconnects on one or more fabrics. All available switches, host bus adapters (HBAs), and
storage devices are discovered. The Cisco MDS 9000 Family switches use Fabric-Device Management
Interface (FMDI) to retrieve HBA model, serial number and firmware version, and host operating-system
type and version discovery without host agents. Fabric Manager gathers this information through SNMP
queries to each switch. The device information discovered includes device names, software revision
levels, vendor, ISLs, PortChannels, and VSANs.
For a VSAN change involving a third-party switch, Fabric Manager will need a second discovery to show
the correct topology due to the discovery dependency when there is any change in a mixed VSAN. The
first discovery finds the third-party switch and the subsequent discovery will show the information on
which VSAN it is going to join and can discover the end devices connected to it. You can wait for the
subsequent discovery or trigger a manual discovery
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Topology Mapping
Fabric Manager is built upon a topology representation of the fabric. Fabric Manager provides an
accurate view of multiple fabrics in a single window by displaying topology maps based on device
discovery information. You can modify the topology map icon layout with an easy-to-use, drag-and-drop
interface. The topology map visualizes device interconnections, highlights configuration information
such as zones, VSANs, and ISLs exceeding utilization thresholds. The topology map also provides a
visual context for launching command-line interface (CLI) sessions, configuring PortChannels, and
opening device managers.
Step 1 Click File > Preferences to open the Fabric Manager preferences dialog box.
Step 2 Click the Map tab and check the Automatically Save Layout check box to save any changes to the
topology map (See Figure 57-1).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Inventory Management
The Information pane in Fabric Manager shows inventory, configuration, and status information for all
switches, links, and hosts in the fabric. Inventory management includes vendor name and model, and
software or firmware versions. Select a fabric or VSAN from the Logical Domains pane, and then select
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
the Summary tab in the Information pane to get a count of the number of VSANS, switches, hosts, and
storage elements in the fabric. See the Fabric Manager Client Quick Tour: Server Admin Perspective
section on page 5-7 for more information on the Fabric Manager user interface.
Step 1 Point your browser at the Fabric Manager Web Server. See the Launching Fabric Manager Web Client
section on page 7-7.
Step 2 Click the Events tab then the Details to view the system messages. The columns in the events table are
sortable. In addition, you can use the Filter button to limit the scope of messages within the table.
Note To view syslog local logs, you need to configure the IP address of the Fabric Manager Server in the
syslog host.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 58
Performance Monitoring
Cisco Fabric Manager and Device Manager provide multiple tools for monitoring the performance of the
overall fabric, SAN elements, and SAN links. These tools provide real-time statistics as well as historical
performance monitoring.
This chapter contains the following sections:
Real-Time Performance Monitoring, page 58-1
Historical Performance Monitoring, page 58-4
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The configurable monitor per port option gives statistics for in and out traffic on that port, errors, class
2 traffic and other data that can be graphed over a period of time to give a real-time view into the
performance of the port.
To configure per port monitoring using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select a value from the Interval drop-down list to determine how often data is updated in the table shown
here.
Step 4 Click a statistical value in the table then click one of the graphing icons to display a running graph of
that statistic over time. You see a graph window that contains options to change the graph type.
Tip You can open multiple graphs for statistics on any of the active ports on the switch.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Baseline thresholds are defined for a configured time of day or week (1 day, 1 week, or 2 weeks). The
baseline is created by calculating the average of the statistical results for the configured time each day,
week, or every 2 weeks. Table 58-2 shows an example of the statistics used to create the baseline value
for a collection defined at 4 pm on a Wednesday.
Table 58-2 Baseline Time Periods for a Collection Started on Wednesday at 4pm
Baseline thresholds create a threshold that adapts to the typical traffic pattern for each link for the same
time window each day, week, or every 2 weeks. Baseline thresholds are set as a percent of the average
(110% to 500%), where 100% equals the calculated average.
As an example, a collection is created at 4 pm on Wednesday, with baseline thresholds set for 1 week,
at 150% of the average (warning) and 200% of the average (critical). Performance Manager recalculates
the average for each link at 4 pm every Wednesday by taking the statistics gathered at that time each
Wednesday since the collection started. Using this as the new average, Performance Manager compares
each received traffic statistic against this value and sends a warning or critical event if the traffic on a
link exceeds this average by 150% or 200% respectively.
Table 58-3 shows two examples of 1-Gigabit links with different averages in our example collection and
at what traffic measurements the Warning and Critical events are sent.
Set these thresholds on the last screen of the Collections Configuration Wizard by checking the Send
events if traffic exceeds threshold check box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Fabric Manager Web Server must be running for this to work. See the Launching Fabric
Manager Web Client section on page 7-7.
Performance Summary
The Performance Summary page presents a dashboard display of the throughput and link utilization for
hosts, ISLs, storage, and flows for the last 24-hour period. The summary provides a quick overview of
the fabrics bandwidth consumption and highlights any hotspots.
The report includes network throughput pie charts and link utilization pie charts. Use the navigation tree
on the left to show summary reports for monitored fabrics or VSANs. The summary displays charts for
all hosts, storage elements, ISLs, and flows. Each pie chart shows the percent of entities (links, hosts,
storage, ISLs, or flows) that measure throughput or link utilization on each of six predefined ranges.
Move the mouse over a pie chart section to see how many entities exhibit that range of statistics.
Double-click any pie chart to bring up a table of statistics for those hosts, storage elements, ISLs, or
flows.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip Name the reports with a timestamp so that you can easily find the report for a given day or week.
These Top10 reports differ from the other monitoring tables and graphs in Performance Manager in that
the other data is continuously monitored and is sortable on any table column. The Top10 reports are a
snapshot view at the time the report was generated.
Note Top10 reports require analyzing the existing data over an extended period of time and can take hours or
more to generate on large fabrics.
See the Creating a Custom Report Template section on page 7-37 for information on creating a Top10
report.
On UNIX, you can automate the generation of the Top10 reports on your Fabric Manager Server host by
adding the following cron entry to generate the reports once an hour:
0 * * * * /<user_directory>/.cisco_mds9000/bin/pm.sh display pm/pm.xml <output_directory>
If your crontab does not run automatically or Java complains about an exception similar to
Example 58-1, you need to add -Djava.awt.headless=true to the JVMARGS command in
/<user_directory>/.cisco_mds9000/bin/pm.sh.
in thread main java.lang.InternalError Can't connect to X11 window server using '0.0' as
the value of the DISPLAY variable.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
In this command, xxx is the RRD file and yyy is the XML file that is generated. This XML file is in a
format that rrdtool is capable of reading with the command:
rrdtool restore filename.xml filename.rrd
This reads the XML export format that rrdtool is capable of writing with the command:
rrdtool xport filename.xml filename.rrd.
The pm xport and pm restore commands can be found on your Fabric Manager Server at bin\PM.bat
for Windows platforms or bin/PM.sh on UNIX platforms. For more information on the rrdtool, refer to
the following website: http://www.rrdtool.org.
Note Fabric Manager Web Server must be running for this to work. See the Launching Fabric
Manager Web Client section on page 7-7.
To export data collections to Microsoft Excel using Fabric Manager Web Server, follow these steps:
To export data collections using command-line batch mode, follow these steps:
Step 1 Go to the installation directory on your workstation and then go to the bin directory.
Step 2 On Windows, enter .\pm.bat export C:\Program Files\Cisco Systems\MDS 9000\pm\pm.xml <export
directory>. This creates the csv file (export.csv) in the export directory on your workstation.
Step 3 On UNIX, enter ./pm.sh export /usr/local/cisco_mds9000/pm/pm.xml <export directory>. This
creates the csv file (export.csv) in the export directory on your workstation.
When you open this exported file in Microsoft Excel, the following information displays:
Title of the entity you exported and the address of the switch the information came from.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Set up the Cisco Traffic Analyzer according to the instructions in the Cisco MDS 9000 Family Port
Analyzer Adapter 2 Installation and Configuration Note.
Step 2 Get the following three items of information:
The IP address of the management workstation on which you are running Performance Manager and
Cisco Traffic Analyzer.
The path to the directory where Cisco Traffic Analyzer is installed.
The port that is used by Cisco Traffic Analyzer (the default is 3000).
Step 3 Start the Cisco Traffic Analyzer.
a. Choose Performance > Traffic Analyzer > Open.
b. Enter the URL for the Cisco Traffic Analyzer, in the format:
http://<ip address>:<port number>
ip address is the address of the management workstation on which you have installed the Cisco
Traffic Analyzer, and
:port number is the port that is used by Cisco Traffic Analyzer (the default is :3000).
c. Click OK.
d. Choose Performance > Traffic Analyzer > Start.
e. Enter the location of the Cisco Traffic Analyzer, in the format:
D:\<directory>\ntop.bat
where:
D: is the drive letter for the disk drive where the Cisco Traffic Analyzer is installed.
directory is the directory containing the ntop.bat file.
f. Click OK.
Step 4 Create the flows you want Performance Manager to monitor, using the Flow Configuration Wizard. See
the Creating a Flow with Performance Manager section on page 58-4
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Define the data collection you want Performance Manager to gather, using the Performance Manager
Configuration Wizard. See the Creating a Collection with Performance Manager section on page 58-4.
a. Choose the VSAN you want to collect information for or choose All VSANs.
b. Check the types of items you want to collect information for (Hosts, ISLs, Storage Devices, and
Flows).
c. Enter the URL for the Cisco Traffic Analyzer in the format:
http://<ip address>/<directory>
where:
ip address is the address of the management workstation on which you have installed the Cisco
Traffic Analyzer, and directory is the path to the directory where the Cisco Traffic Analyzer is
installed.
d. Click Next.
e. Review the data collection on this and the next section to make sure this is the data you want to
collect.
f. Click Finish to begin collecting data.
Note Data is not collected for JBOD or for virtual ports. If you change the data collection
configuration parameters during a data collection, you must stop and restart the collection
process for your changes to take effect.
Step 6 Choose Performance > Reports to generate a report. Performance Manager Web Server must be
running. See the Launching Fabric Manager Web Client section on page 7-7. You see Web Services;
click Custom then select a report template.
Note It takes at least five minutes to start collecting data for a report. Do not attempt to generate a
report in Performance Manager during the first five minutes of collection.
Step 7 Click the Cisco Traffic Analyzer at the top of the Host or Storage detail pages to view the Cisco Traffic
Analyzer information, or choose Performance > Traffic Analyzer > Open. The Cisco Traffic Analyzer
page will not open unless ntop has been started already.
Note For information on capturing a SPAN session and starting a Cisco Traffic Analyzer session to
view it, refer to the Cisco MDS 9000 Family Port Analyzer Adapter 2 Installation and
Configuration Note.
Note For information on viewing and interpreting your Performance Manager data, see the Historical
Performance Monitoring section on page 58-4.
For information on viewing and interpreting your Cisco Traffic Analyzer data, refer to the Cisco
MDS 9000 Family Port Analyzer Adapter 2 Installation and Configuration Note.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
For performance drill-down, Fabric Manager Server can launch the Cisco Traffic Analyzer in-context
from the Performance Manager graphs. The aliases associated with hosts, storage devices, and VSANs
are passed to the Cisco Traffic Analyzer to provide consistent, easy identification.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 59
Configuring RMON
RMON is an Internet Engineering Task Force (IETF) standard monitoring specification that allows
various network agents and console systems to exchange network monitoring data. You can use the
RMON alarms and events to monitor Cisco MDS 9000 Family switches running the Cisco SAN-OS
Release 2.0(1b) or later or Cisco NX-OS 4.1(3a) software.
This chapter includes the following sections:
About RMON, page 59-1
Configuring RMON Using Threshold Manager, page 59-1
Default Settings, page 59-16
About RMON
All switches in the Cisco MDS 9000 Family support the following RMON functions (defined in RFC
2819):
AlarmEach alarm monitors a specific management information base (MIB) object for a specified
interval. When the MIB object value exceedes a specified value (rising threshold), the alarm
condition is set and only one event is triggered regardless of how long the condition exists. When
the MIB object value falls below a certain value (falling threshold), the alarm condition is cleared.
This allows the alarm to trigger again when the rising threshold is crossed again.
EventDetermines the action to take when an event is triggered by an alarm. The action can be to
generate a log entry, an SNMP trap, or both.
For agent and management information, see the Cisco MDS 9000 Family MIB Quick Reference.
For SNMP security-related CLI configurations, see the About SNMP Security section on page 40-1
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
ValueThe value of the variable that you want the alarm to trigger at. This value is the difference
(delta) between two consecutive polls of the variable by Device Manager.
SampleThe sample period (in seconds) between two consecutive polls of the variable. Select your
sample period such that the variable does not cross the threshold value you set under normal
operating conditions.
WarningThe warning level used by Device Manager to indicate the severity of the triggered alarm.
This is a Fabric Manager and Device Manager enhancement to RMON.
Note To configure any type of RMON alarm (absolute or delta, rising or falling threshold) click More on the
Threshold Manager dialog box. You should be familiar with how RMON defines these concepts before
configuring these advanced alarm types. Refer to the RMON-MIB (RFC 2819) for information on how
to configure RMON alarms.
Note You must also configure SNMP on the switch to access RMON MIB objects.
Caution The falling threshold must be less than the rising threshold.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Admin > Events > Threshold Manager and click the FC Interfaces tab.
You see the Threshold Manager dialog box as shown in Figure 59-1.
Step 2 Choose the Select radio button to select individual ports for this threshold alarm.
a. Click the ... button to the right of the Selected field to display all ports.
b. Select the ports you want to monitor.
c. Click OK to accept the selection.
Alternatively, click the appropriate radio button to choose ports by type: All ports, xE ports, or Fx ports.
Step 3 Check the check box for each variable to be monitored.
Step 4 Enter the threshold value in the Value column.
Step 5 Enter the sampling period in seconds. This is the time between each snapshot of the variable.
Step 6 Choose one of the following severity levels to assign to the alarm: Fatal, Warning, Critical, Error,
Information.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Admin > Events > Threshold Manager and click the FC Interfaces > Create tab.
You see the create 32-bit and 64-bit alarm dialog box shown in Figure 59-2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Click the Select radio button to select individual ports for this threshold alarm.
a. Click the ... button to the right of the Selected field to display all ports.
b. Select the ports you want to monitor.
c. Click OK to accept the selection.
Alternatively, click the appropriate radio button to choose ports by type: All ports, xE ports, or Fx ports.
Step 3 Check the check box for each variable to be monitored.
Step 4 Enter the threshold value in the Value column.
Step 5 Enter the sampling period in seconds. This is the time between each snapshot of the variable.
Step 6 Choose one of the following severity levels to assign to the alarm: Fatal, Warning, Critical, Error,
Information.
Step 7 Click Create.
Step 8 Confirm the operation to define an alarm and a log event when the system prompts you to define a
severity event. If you do not confirm the operation, the system only defines a log event.
Step 9 Click More and then click the Alarms tab from the Threshold Manager dialog box to verify the alarm
you created. The 32and 64-bit alarm show second as unit on the Interval column.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Figure 59-6 MIB Variable Field Dialog Box for 64-Bit Alarms
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You need to supply the interface details along with variables selected from the drop-down list to
complete the Variable field, for example, ifHCInOctets.
Figure 59-7 MIB Variable Field Dialog Box for 32-Bit Alarms
Step 10 Click the radio button to choose the RMON alarm to be created (32-bit or 64-bit HC Alarm).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Admin > Events > Threshold Manager and click the Services tab.
You see the Threshold Manager dialog box.
Step 2 Click the Services tab.
You see the Threshold Manager dialog box with the Services tab for 32-bit alarm selecte as shown in
Figure 59-8.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Admin > Events > Threshold Manager and click the Physical tab.
You see the Threshold Manager dialog box with the Physical tab for the 64-bit alarm selected as shown
in Figure 59-9.
Step 2 Check the check box in the Select column for each variable to monitor.
Step 3 Enter the threshold value in the Value column.
Step 4 Enter the sampling period in seconds.
Step 5 Choose one of the following severity levels to assign to the alarm: Fatal(1), Warning(2), Critical(3),
Error(4), Information(5).
Step 6 Click Create.
Step 7 Confirm the operation to define an alarm and a log event when the system prompts you to define a
severity event.
If you do not confirm the operation, the system only defines a log event.
Step 8 Click More, then click the 64-bit Alarms tab in the Threshold Manager dialog box to verify the alarm
you created (see Figure 59-10).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The MaxAlarm option is noneditable because of backend support. The max RMON alarms cannot be set
using the CLI.
Step 1 Choose Physical Attributes > Events > RMON and click the Control tab.
You see the create RMON alarm Threshold Manager dialog box as shown in Figure 59-11.
A user error is prompted if adding the new alarm exceeds the maximum alarm.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note This feature is applicable when managing switches Release 4.1(1b) and later. Device Manager can only
treat the existing alarm number as 0 for the checking.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Admin > Events > Threshold Manager and click the Services tab.
You see the Threshold Manager dialog box.
Step 2 Click the Services tab.
You see the Threshold Manager dialog box with the Services tab selected as shown in Figure 59-14.
Step 3 Enter one or more VSANs (multiple VSANs separated by commas) to monitor in the VSAN ID(s) field.
Use the down arrow to see a list of available VSANs to choose from.
Step 4 Check the check box in the Select column for each variable to monitor.
Step 5 Enter the threshold value in the Value column.
Step 6 Enter the sampling period in seconds.
Step 7 Choose a severity level to assign to the alarm (Fatal, Critical, Error, Warning, or Information).
Step 8 Click Create.
Step 9 Confirm the operation to define an alarm and a log event when the system prompts you to define a
severity event.
If you do not confirm the operation, the system only defines a log event.
Step 10 Click More, then click the Alarms tab in the Threshold Manager dialog box to verify the alarm you
created (see Figure 59-15).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Admin > Events > Threshold Manager and click More in the Threshold Manager dialog box.
Step 2 Click the Events tab in the RMON Thresholds dialog box.
You see the RMON Thresholds Events tab as shown in Figure 59-16.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Configure the RMON threshold event attributes by choosing the type of event (log, snmptrap, or
logandtrap).
Step 5 Increment the index. If you try to create an event with the existing index, you see a duplicate entry error
message.
Step 6 (Optional) Provide a description and a community.
Step 7 Click Create, then close this dialog box.
Step 8 Verify that your event is listed in the remaining RMON Thresholds dialog box.
Step 9 Click Close to close the RMON Thresholds dialog box.
Step 1 Choose Admin > Events > Threshold Manager and click More in the Threshold Manager dialog box.
Step 2 Click the Alarms tab.
You see the RMON Thresholds dialog box as shown in Figure 59-18.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Admin > Events > Threshold Manager and click More on the Threshold Manager dialog box.
Step 2 Click the Log tab in the RMON Thresholds dialog box.
You see the RMON Thresholds Log tab (see Figure 59-19). This is the log of RMON events that have
been triggered by the Threshold Manager.
Default Settings
Table 59-1 lists the default settings for all RMON features in any switch.
Parameters Default
RMON alarms Disabled.
RMON events Disabled.
CH A P T E R 60
Monitoring Network Traffic Using SPAN
This chapter describes the Switched Port Analyzer (SPAN) features provided in switches in the Cisco
MDS 9000 Family. It includes the following sections:
About SPAN, page 60-1
SPAN Sources, page 60-2
SPAN Sessions, page 60-5
Specifying Filters, page 60-5
SD Port Characteristics, page 60-5
Configuring SPAN, page 60-6
Monitoring Traffic Using Fibre Channel Analyzers, page 60-10
Default SPAN Settings, page 60-13
About SPAN
The SPAN feature is specific to switches in the Cisco MDS 9000 Family. It monitors network traffic
through a Fibre Channel interface. Traffic through any Fibre Channel interface can be replicated to a
special port called the SPAN destination port (SD port). Any Fibre Channel port in a switch can be
configured as an SD port. Once an interface is in SD port mode, it cannot be used for normal data traffic.
You can attach a Fibre Channel Analyzer to the SD port to monitor SPAN traffic (see theConfiguring
the Cisco Fabric Analyzer section on page 66-19.
SD ports do not receive frames, they only transmit a copy of the SPAN source traffic. The SPAN feature
is non-intrusive and does not affect switching of network traffic for any SPAN source ports (see
Figure 60-1).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
85478
SD port
SPAN Sources
SPAN sources refer to the interfaces from which traffic can be monitored. You can also specify VSAN
as a SPAN source, in which case, all supported interfaces in the specified VSAN are included as SPAN
sources. You can choose the SPAN traffic in the ingress direction, the egress direction, or both directions
for any source interface:
Ingress source (Rx)Traffic entering the switch fabric through this source interface is spanned or
copied to the SD port (see Figure 60-2).
fc3/1
SD port
Egress source (Tx)Traffic exiting the switch fabric through this source interface is spanned or
copied to the SD port (see Figure 60-3).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
fc1/2
fc3/1
85480
SD port
Note You can configure SPAN for Ethernet traffic using Cisco switches or routers connected to the Cisco MDS
9000 Family IPS modules.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
VSAN as a Source
When a VSAN as a source is specified, then all physical ports and PortChannels in that VSAN are
included as SPAN sources. A TE port is included only when the port VSAN of the TE port matches the
source VSAN. A TE port is excluded even if the configured allowed VSAN list may have the source
VSAN, but the port VSAN is different.
You cannot configure source interfaces (physical interfaces, PortChannels, or sup-fc interfaces) and
source VSANs in the same SPAN session.
TE port
Allowed list = VSAN 1,VSAN 2 and VSAN 3
Fibre Channel
traffic
VSAN 1, VSAN 3
VSAN 2 as source fc2/1
VSAN 1 VSAN 2
fc1/1
Cisco MDS 9000 switch VSAN 2
fc9/1
85481
SD port
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
SPAN Sessions
Each SPAN session represents an association of one destination with a set of source(s) along with
various other parameters that you specify to monitor the network traffic. One destination can be used by
one or more SPAN sessions. You can configure up to 16 SPAN sessions in a switch. Each session can
have several source ports and one destination port.
To activate any SPAN session, at least one source and the SD port must be up and functioning. Otherwise,
traffic is not directed to the SD port.
Tip A source can be shared by two sessions, however, each session must be in a different directionone
ingress and one egress.
You can temporarily deactivate (suspend) any SPAN session. The traffic monitoring is stopped during
this time.
Specifying Filters
You can perform VSAN-based filtering to selectively monitor network traffic on specified VSANs. You
can apply this VSAN filter to all sources in a session (see Figure 60-4). Only VSANs present in the filter
are spanned.
You can specify session VSAN filters that are applied to all sources in the specified session. These filters
are bidirectional and apply to all sources configured in the session.
SD Port Characteristics
An SD port has the following characteristics:
Ignores BB_credits.
Allows data traffic only in the egress (Tx) direction.
Does not require a device or an analyzer to be physically connected.
Supports only 1 Gbps or 2 Gbps speeds. The auto speed option is not allowed.
Multiple sessions can share the same destination ports.
If the SD port is shut down, all shared sessions stop generating SPAN traffic.
The outgoing frames can be encapsulated in Extended Inter-Switch Link (EISL) format.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note If you need to change an SD port mode to another port mode, first remove the SD port from all sessions
and then change the port mode.
Configuring SPAN
To monitor network traffic using SD ports, follow these steps:
Configuring SPAN
To configure an SD port for SPAN monitoring using Device Manager, follow these steps:
Step 1 Right-click the port you want to configure and select Configure.
You see the general port configuration dialog.
Step 2 Under Mode, choose SD.
Step 3 Click Apply to accept the change.
Step 4 Close the dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The span max-queued-packets can be changed only if no span sessions are currently active on the switch.
Note If you are spanning the traffic going through an FCIP interface, span copies may be dropped even if the
SD interface has more bandwidth than the amount of traffic being replicated. To avoid span drops, set
the max-queued-packets to a higher value; for example, 100.
Step 1 Choose Interface > SPAN. You see the SPAN dialog box.
Step 2 Click the Sessions tab.
Step 3 Click Create.
You see the Create SPAN Sessions dialog box shown in Figure 60-5.
Step 4 Choose the session ID (from 1-16) using the up or down arrows and click Create.
Step 5 Repeat Step 4 for each session you want to create.
Step 6 Enter the destination interface in the Dest Interface field for the appropriate session.
Step 7 Enter the filter VSAN list in the Filter VSAN List field for the appropriate session.
Step 8 Choose active or in active admin status in the Admin drop-down list.
Step 9 Click Apply to save your changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Enter the VSAN list name in the VSAN List field.
Step 4 Click Edit Interface List.
You see the Source Interfaces dialog box.
Step 5 Click Create.
You see the Source Interfaces Interface Sources dialog box shown in Figure 60-7.
Step 6 Click the browse button to display the list of available FC ports.
Step 7 Choose a port and click OK.
Step 8 Click the direction (receive or transmit) you want.
Step 9 Click Create to create the FC interface source.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Session 1 had both source interfaces and source VSANs before the upgrade. After the upgrade, the
source VSANs were removed (rule 1).
If interface level VSAN filters are configured in source interfaces, then the source interfaces are also
removed from the session. If this interface is configured in both directions, it is removed from both
directions.
For example, before Cisco MDS SAN-OS Release 1.0(4):
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Session 2 (active)
Destination is fc1/9
No session filters configured
Ingress (rx) sources are
vsans 12
fc1/6 (vsan 1-20),
Egress (tx) sources are
fc1/6 (vsan 1-20),
Note The deprecated configurations are removed from persistent memory once a switchover or a new
startup configuration is implemented.
Session 2 had a source VSAN 12 and a source interface fc1/6 with VSAN filters specified in Cisco
MDS SAN-OS Release 1.0(4). When upgraded to Cisco MDS SAN-OS Release 1.1(1) the following
changes are made:
The source VSAN (VSAN 12) is removed (rule 1).
The source interface fc1/6 had VSAN filters specifiedit is also removed (rule 2).
Without SPAN
You can monitor traffic using interface fc1/1 in a Cisco MDS 9000 Family switch that is connected to
another switch or host. You need to physically connect a Fibre Channel analyzer between the switch and
the storage device to analyze the traffic through interface fc1/1 as shown in Figure 60-8.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Cisco Storage
MDS 9000 device
switch
fc1/1
Cisco Storage
MDS 9000 device
switch
fc1/1 RX =TX
1 FC Analyzer 2
TX RX
85651
This type of connection has the following limitations:
It requires you to physically insert the FC analyzer between the two network devices.
It disrupts traffic when the Fibre Channel analyzer is physically connected.
The analyzer captures data only on the Rx links in both port 1 and port 2. Port 1 captures traffic
exiting interface fc1/1 and port 2 captures ingress traffic into interface fc1/1.
With SPAN
Using SPAN you can capture the same traffic scenario shown in Figure 60-8 without any traffic
disruption. The Fibre Channel analyzer uses the ingress (Rx) link at port 1 to capture all the frames going
out of the interface fc1/1. It uses the ingress link at port 2 to capture all the ingress traffic on interface
fc1/1.
Using SPAN you can monitor ingress traffic on fc1/1 at SD port fc2/2 and egress traffic on SD port fc2/1.
This traffic is seamlessly captured by the FC analyzer as shown in Figure 60-9.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
RX
SD Port SD Port
fc2/1 fc2/2
TX TX
Dropped * * The egress (TX) traffic coming out from
the analyzer ports will be dropped.
RX RX
TX TX
1 2
85652
FC Analyzer
Step 1 Configure SPAN on interface fc1/1 in the ingress (Rx) direction to send traffic on SD port fc2/1 using
session 1.
Step 2 Configure SPAN on interface fc1/1in the egress (Tx) direction to send traffic on SD port fc2/2 using
session 2.
Step 3 Physically connect fc2/1 to port 1 on the Fibre Channel analyzer.
Step 4 Physically connect fc2/2 to port 2 on the Fibre Channel analyzer.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
RX
SD Port
fc2/1
TX
Dropped* * The egress (TX) traffic coming out from
the analyzer ports will be dropped.
TX
TX
1
85653
FC Analyzer
To use this setup, the analyzer should have the capability of distinguishing ingress and egress traffic for
all captured frames.
Parameters Default
SPAN session Active.
If filters are not specified SPAN traffic includes traffic through a specific interface from all active
VSANs.
Encapsulation Disabled.
SD port Output frame format is Fibre Channel.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 61
Configuring System Message Logging
This chapter describes how to configure system message logging on Cisco MDS 9000 Family switches.
It includes the following sections:
About System Message Logging, page 61-1
System Message Logging Configuration, page 61-3
Default Settings, page 61-11
Note When the switch first initializes, the network is not connected until initialization completes. Therefore,
messages are not redirected to a system message logging server for a few seconds.
Log messages are not saved across system reboots. However, a maximum of 100 log messages with a
severity level of critical and below (levels 0, 1, and 2) are saved in NVRAM.
Table 61-1 describes some samples of the facilities supported by the system message logs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 61-2 describes the severity levels supported by the system message logs.
Note Refer to the Cisco MDS 9000 Family System Messages Reference for details on the error log message
format.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
When you disable or enable logging to a console session, that state is applied to all future console
sessions. If you exit and log in again to a new session, the state is preserved.
When you enable or disable logging to a Telnet or SSH session, that state is applied only to that
session. If you exit and log in again to a new session, the state is not preserved.
To enable or disable the logging state for a Telnet or SSH session using Fabric Manager, follow these
steps:
Tip The current critical (default) logging level is maintained if the console baud speed is 9600 baud (default).
All attempts to change the console logging level generates an error message. To increase the logging
level (above critical), you must change the console baud speed to 38400 baud.
To configure the severity level for a logging facility using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Module Logging
By default, logging is enabled at level 7 for all modules. You can enable or disable logging for each
module at a specified level.
To configure the severity level for a logging facility, follow these steps:
Step 1 In Fabric Manager, expand Switches, expand Events and select SysLog in the Physical Attributes pane.
In Device Manager, choose Logs > Syslog > Setup and click the Switch Logging tab in the Syslog
dialog box.
You see the switch information shown in Figure 61-3 or Figure 61-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Check the check boxes where you want message logging to occur (ConsoleEnable, TerminalEnable,
LineCardEnable).
Step 3 Choose the message severity threshold from the Console Severity drop-down box for each switch in
Fabric Manager (see Figure 61-3) or click the appropriate message severity level radio button in Device
Manager (see Figure 61-4).
Step 4 Click the Apply Changes icon in Fabric Manager, or click Apply in Device Manager to save and apply
your changes.
Log Files
Logging messages can be saved to a log file. You can configure the name of this file and restrict its size
as required. The default log file name is messages. The file name can have up to 80 characters and the
file size ranges from 4096 bytes to 4194304 bytes.
To send log messages to a file using Fabric Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 Enter the name of the log file in the LogFile Name column in the row for that switch.
Step 6 Click the Apply Changes icon.
Note The configured log file is saved in the /var/log/external directory. The location of the log file cannot be
changed.
Note Be sure to add five tab characters between local1.debug and /var/log/myfile.log. Refer to entries
in the /etc/syslog.conf file for further examples.
The switch sends messages according to the specified facility types and severity levels. The local1
keyword specifies the UNIX logging facility used. The messages from the switch are generated by user
processes. The debug keyword specifies the severity level of the condition being logged. You can set
UNIX systems to receive all messages from the switch.
Step 2 Create the log file by entering these commands at the UNIX shell prompt:
$ touch /var/log/myfile.log
$ chmod 666 /var/log/myfile.log
Step 3 Make sure the system message logging daemon reads the new changes by entering this command:
$ kill -HUP ~cat /etc/syslog.pid~
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Most tabs in the Information pane for features using CFS are dimmed until you click the CFS tab. The
CFS tab shows which switches have CFS enabled and shows the master switch for this feature. Once the
CFS tab is click, the other tabs in the Information pane that use CFS are activated.
You can configure a maximum of three syslog servers. One of these syslog servers should be Fabric
Manager if you want to view system messages from the Event tab in Fabric Manager.
To configure system message logging servers, follow these steps:
Step 1 In Fabric Manager, expand Switches, expand Events and select SysLog in the Physical Attributes pane,
then click the Servers tab in the Information pane.
In Device Manager, choose Logs > Syslog > Setup and click the Servers tab in the Syslog dialog box.
Step 2 Click the Create Row icon in Fabric Manager, or click Create in Device Manager (see Figure 61-7) to
add a new syslog server.
Step 3 Enter the name or IP address in dotted decimal notation (for example, 192.168.2.12) of the syslog server
in the Name or IP Address field.
Step 4 Set the message severity threshold by clicking the MsgSeverity radio button and set the facility by
clicking the Facility radio button.
Step 5 Click the Apply Changes icon in Fabric Manager, or click Create in Device Manager to save and apply
your changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Device Manager allows you to view event logs on your local PC as well as those on the switch. For a
permanent record of all events that occur on the switch, you should store these messages off the switch.
To do this the MDS switch must be configured to send syslog messages to your local PC and a syslog
server must be running on that PC to receive those messages. These messages can be categorized into
four classes:
HardwareLine card or power supply problems
Link IncidentsFICON port condition changes
AccountingUser change events
EventsAll other events
Note You should avoid using PCs that have IP addresses randomly assigned to them by DHCP. The switch
continues to use the old IP address unless you manually change it; however the Device Manager prompts
you if it does detect this situation. UNIX workstations have a built-in syslog server. You must have root
access (or run the Cisco syslog server as setuid to root) to stop the built-in syslog daemon and start the
Cisco syslog server.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Point your browser at the Fabric Manager Web Server. See the Launching Fabric Manager Web Client
section on page 7-7.
Step 2 Choose Events > Syslog to view the syslog server information for each switch. The columns in the table
are sortable.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Point your browser at the Fabric Manager Web Server. See the Launching Fabric Manager Web Client
section on page 7-7.
Step 2 Click the Events tab followed by the Details to view the system messages. The columns in the events
table are sortable. In addition, you can use the Filter button to limit the scope of messages within the
table.
Note When using the show logging command, output is displayed only when the configured logging levels
for the switch are different from the default levels.
Default Settings
Table 61-4 lists the default settings for system message logging.
Parameters Default
System message logging to the console Enabled for messages at the critical severity level.
System message logging to Telnet sessions Disabled.
Logging file size 4194304.
Log file name Message (change to a name with up to 200 characters).
Logging server Disabled.
Syslog server IP address Not configured.
Number of servers Three servers.
Server facility Local 7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 62
Configuring Call Home
Call Home provides e-mail-based notification of critical system events. A versatile range of message
formats are available for optimal compatibility with pager services, standard e-mail, or XML-based
automated parsing applications. Common uses of this feature may include direct paging of a network
support engineer, e-mail notification to a Network Operations Center, and utilization of Cisco Smart Call
Home services for direct case generation with the Technical Assistance Center.
Note Cisco Autonotify is upgraded to a new capability called Smart Call Home. Smart Call Home has
significant functionality improvement over Autonotify and is available across the Cisco product range.
For detailed information on Smart Call Home, see the Smart Call Home page at this location:
http://www.cisco.com/go/smartcall/
The Call Home feature provides message throttling capabilities. Periodic inventory messages, port
syslog messages, and RMON alert messages are added to the list of deliverable Call Home messages. If
required you can also use the Cisco Fabric Services application to distribute the Call Home configuration
to all other switches in the fabric.
This chapter includes the following sections:
Call Home Features, page 62-2
About Smart Call Home, page 62-2
Obtaining Smart Call Home, page 62-5
Configuring Call Home, page 62-5
Configuring Contact Information, page 62-6
Destination Profiles, page 62-7
Alert Groups, page 62-9
Customized Alert Group Messages, page 62-10
Call Home Message Level Feature, page 62-11
Syslog-Based Alerts, page 62-12
RMON-Based Alerts, page 62-13
E-Mail Options, page 62-14
HTTPS Support, page 62-22
Periodic Inventory Notification, page 62-15
Duplicate Message Throttle, page 62-16
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Analysis of Call Home messages from your device and where appropriate, automatic service request
generation, routed to the appropriate TAC team, including detailed diagnostic information to speed
problem resolution.
Secure message transport through a downloadable Transport Gateway (TG) aggregation point. You
can use a TG aggregation point in cases requiring support for multiple devices or in cases where
security requirements mandate that your devices not be connected directly to the Internet.
Web-based access to Call Home messages and recommendations, inventory and configuration
information for all Call Home devices. Provides access to associated Field Notices, Security
Advisories and End-of-Life Information.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Switch priority is specific to each switch in the fabric. This priority is used by the operations personnel
or TAC support personnel to decide which Call Home message they should respond to first. You can
prioritize Call Home alerts of the same severity from each switch.
To assign the contact information using Fabric Manager, follow these steps:
Step 1 In the Fabric Manager Physical Attributes pane, expand Switches, expand Events, and select Call
Home.
You see the Call Home tabs in the Information pane (see Figure 62-1).
Step 2 In Device Manager, click Admin > Events > Call Home. See Figure 62-2.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click the General tab, then assign contact information and enable the Call Home feature. Call Home is
not enabled by default. You must enter an e-mail address that identifies the source of Call Home
notifications.
Step 4 Click the Destination(s) tab to configure the destination e-mail addresses for Call Home notifications.
You can identify one or more e-mail addresses that will receive Call Home notifications.
Step 5 Click the e-mail Setup tab to identify the SMTP server. Identify a message server to which your switch
has access. This message server will forward the Call Home notifications to the destinations.
Step 6 In Fabric Manager, click the Apply Changes icon. In Device Manager, click Apply.
Destination Profiles
A destination profile contains the required delivery information for an alert notification. Destination
profiles are typically configured by the network administrator. At least one destination profile is
required. You can configure multiple destination profiles of one or more types.
You can use one of the predefined destination profiles or define a desired profile. If you define a new
profile, you must assign a profile name.
Note If you use the Cisco Smart Call Home service, the XML destination profile is required (see
http://www.cisco.com/en/US/partner/products/hw/ps4159/ps4358/products_configuration_example091
86a0080108e72.shtml).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Profile nameA string that uniquely identifies each user-defined destination profile and is limited
to 32 alphanumeric characters. The format options for a user-defined destination profile are full-txt,
short-txt, or XML (default).
Destination addressThe actual address, pertinent to the transport mechanism, to which the alert
should be sent.
Message formattingThe message format used for sending the alert (full text, short text, or XML).
To configure predefined destination profile messaging options using Fabric Manager, follow these steps:
Step 1 Expand Switches, expand Events, and select Call Home in the Physical Attributes pane.
Step 2 Click the Profiles tab in the Information pane.
You see the Call Home profiles for multiple switches shown in Figure 62-3.
Step 3 Set the profile name, message format, message size, and severity level.
Step 4 Click in the Alert Groups column and select or remove an alert group.
Step 5 Click the Apply Changes icon to create this profile on the selected switches.
To configure a new destination-profile (and related parameters) using Fabric Manager, follow these
steps:
Step 1 Expand Switches, expand Events, and select Call Home in the Physical Attributes pane.
Step 2 Click the Profiles tab in the Information pane.
You see Call Home profiles for multiple switches.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Click the Apply Changes icon to create this profile on the selected switches.
Alert Groups
An alert group is a predefined subset of Call Home alerts supported in all switches in the Cisco MDS
9000 Family. Different types of Call Home alerts are grouped into different alert groups depending on
their type. You can associate one or more alert groups to each profile as required by your network.
The alert group feature allows you to select the set of Call Home alerts to be received by a destination
profile (either predefined or user-defined). You can associate multiple alert groups with a destination
profile.
Note A Call Home alert is sent to e-mail destinations in a destination profile only if that Call Home alert
belongs to one of the alert groups associated with that destination profile.
To associate an alert group with a destination profile using Fabric Manager, follow these steps:
Step 1 Expand Switches, expand Events, and select Call Home in the Physical Attributes pane.
Step 2 Click the Profiles tab in the Information pane.
You see the Call Home profiles for multiple switches shown in Figure 62-5.
Step 3 Click the Alert Groups column in the row for the profile you want to associate.
You see the alert groups drop-down menu shown in Figure 62-6.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You can assign a maximum of five user-defined show commands to an alert group. Only show commands
can be assigned to an alert group.
Note Customized show commands are only supported for full text and XML alert groups. Short text alert
groups (short-txt-destination) do not support customized show commands because they only allow 128
bytes of text.
To assign show commands to be executed when an alert is sent, you must associate the commands with
the alert group. When an alert is sent, Call Home associates the alert group with an alert type and attaches
the output of the show commands to the alert message.
Note Make sure the destination profiles for a non-Cisco-TAC alert group, with a predefined show command,
and the Cisco-TAC alert group are not the same.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches, expand Events, and select Call Home in the Physical Attributes pane.
Step 2 Click the User Defined Command tab in the Information pane.
You see the User Defined Command information shown in Figure 62-7.
Note Call Home severity levels are not the same as system message logging severity levels.
Step 1 In Fabric Manager, expand the Switches folder in the Physical Attributes pane, expand Events and then
select Call Home.
You see the Call Home information in the Information pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Set a message level for each switch using the drop-down menu in the MsgLevel column.
Step 4 Click the Apply Changes icon to save your changes.
Syslog-Based Alerts
You can configure the switch to send certain syslog messages as Call Home messages. The
syslog-group-port alert group selects syslog messages for the port facility. The Call Home application
maps the syslog severity level to the corresponding Call Home severity level (see the Call Home
Message Levels section on page 62-32). For example, if you select level 5 for the Call Home message
level, syslog messages at levels 0, 1, and 2 are included in the Call Home log.
Whenever a syslog message is generated, the Call Home application sends a Call Home message
depending on the mapping between the destination profile and the alert group mapping and based on the
severity level of the generated syslog message. To receive a syslog-based Call Home alert, you must
associate a destination profile with the syslog alert groups (currently there is only one syslog alert
groupsyslog-group-port) and configure the appropriate message level (see the Call Home Message
Level Feature section on page 62-11).
Note Call Home does not change the syslog message level in the message text. The syslog message texts in
the Call Home log appear as they are described in the Cisco MDS 9000 Family System Messages Guide.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
RMON-Based Alerts
You can configure the switch to send Call Home notifications corresponding to RMON alert triggers. All
RMON-based Call Home messages have their message level set to NOTIFY (2). The RMON alert group
is defined for all RMON-based Call Home alerts. To receive an RMON-based Call Home alert, you must
associate a destination profile with the RMON alert group.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
E-Mail Options
You can configure the from, reply-to, and return-receipt e-mail addresses. While most e-mail address
configurations are optional, you must configure the SMTP server address for the Call Home
functionality to work.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Command Purpose
Step 1 switch# config t Enters configuration mode.
Step 2 switch(config)# callhome Enters Call Home configuration submode.
switch(config-callhome)#
Step 3 switch(config-callhome)# Optional. Enables predefined destination profile
destination-profile CiscoTAC-1 CiscoTAC-1 for http transport-method.
transport-method http
Note For user-defined destination profiles, e-mail is
the default. You can enable either or both
transport mechanisms. If you disable both
methods, e-mail will be enabled.
Step 4 switch(config-callhome)# no Optional. Disables predefined destination profile
destination-profile CiscoTAC-1 CiscoTAC-1 for email transport-method.
transport-method email
Step 5 switch(config-callhome)# Optional. Enables predefined full-txt-destination profile
destination-profile full-txt for HTTP transport method.
transport-method http
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The switch priority and the Syscontact name are not distributed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip The changes are only available in the volatile directory and are subject to being discarded if the switch
is restarted.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 In the Physical Attributes, expand Switches > Events, and select SNMP Traps.
In the table above the map layout in Fabric Manager, click the Delayed Traps tab.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Check the Enable check box for the switches on which you want to enable delayed traps.
Step 3 Enter the timer value in the Delay column.
Step 4 Click Apply to save your changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 In Device Manager choose Admin > Events > Filters > Delayed Traps
You can see the Events Filters information in the Information pane.
Step 2 Click the Delayed Traps tab.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 To disable Delayed Traps, uncheck the Enable check box and click Apply.
syslog_facility:PORT
start chassis information:
Affected Chassis:DS-C9506
Affected Chassis Serial Number:FG@07120011
Affected Chassis Hardware Version:0.104
Affected Chassis Software Version:3.1(1)
Affected Chassis Part No:73-8607-01
end chassis information:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
</aml-session:Path>
<aml-session:From>http://www.cisco.com/appliance/uri</aml-session:From>
<aml-session:MessageId>1004:FOX090306QT:3E55A81A</aml-session:MessageId>
</aml-session:Session>
</soap-env:Header>
<soap-env:Body>
<aml-block:Block xmlns:aml-block="http://www.cisco.com/2004/01/aml-block">
<aml-block:Header>
<aml-block:Type>http://www.cisco.com/2005/05/callhome/syslog</aml-block:Type>
<aml-block:CreationDate>2003-02-21 04:16:18 GMT+00:00</aml-block:CreationDate>
<aml-block:Builder>
<aml-block:Name>MDS</aml-block:Name>
<aml-block:Version>4.1</aml-block:Version>
</aml-block:Builder>
<aml-block:BlockGroup>
<aml-block:GroupId>1005:FOX090306QT:3E55A81A</aml-block:GroupId>
<aml-block:Number>0</aml-block:Number>
<aml-block:IsLast>true</aml-block:IsLast>
<aml-block:IsPrimary>true</aml-block:IsPrimary>
<aml-block:WaitForPrimary>false</aml-block:WaitForPrimary>
</aml-block:BlockGroup>
<aml-block:Severity>6</aml-block:Severity>
</aml-block:Header>
<aml-block:Content>
<ch:CallHome xmlns:ch="http://www.cisco.com/2005/05/callhome" version="1.0">
<ch:EventTime>2003-02-21 04:16:18 GMT+00:00</ch:EventTime>
<ch:MessageDescription>LICENSE_VIOLATION 2003 Feb 21 04:16:18 switch %$
%DAEMON-3-SYSTEM_MSG: <<%LICMGR-3-LOG_LICAPP_NO_LIC>> License file is missing
for feature SAN_EXTN_OVER_IP</ch:MessageDescription>
<ch:Event>
<ch:Type>syslog</ch:Type>
<ch:SubType>LICENSE_VIOLATION</ch:SubType>
<ch:Brand>Cisco</ch:Brand>
<ch:Series>MDS9000</ch:Series>
</ch:Event>
<ch:CustomerData>
<ch:UserData>
<ch:e-mail>[email protected]</ch:e-mail>
</ch:UserData>
<ch:ContractData>
<ch:CustomerId>eeranna</ch:CustomerId>
<ch:SiteId>Bangalore</ch:SiteId>
<ch:ContractId>123</ch:ContractId>
<ch:DeviceId>DS-C9216I-K9@C@FOX090306QT</ch:DeviceId>
</ch:ContractData>
<ch:SystemInfo>
<ch:Name>switch</ch:Name>
<ch:Contact>Eeranna</ch:Contact>
<ch:Contacte-mail>[email protected]</ch:Contacte-mail>
<ch:ContactPhoneNumber>+91-80-310-1718</ch:ContactPhoneNumber>
<ch:StreetAddress>#71, Miller's Road</ch:StreetAddress> </ch:SystemInfo>
</ch:CustomerData> <ch:Device> <rme:Chassis xmlns:rme="http://www.cisco.com/rme/4.0">
<rme:Model>DS-C9216I-K9</rme:Model>
<rme:HardwareVersion>1.0</rme:HardwareVersion>
<rme:SerialNumber>FOX090306QT</rme:SerialNumber>
</rme:Chassis>
</ch:Device>
</ch:CallHome>
</aml-block:Content>
<aml-block:Attachments>
<aml-block:Attachment type="inline">
<aml-block:Name>show logging logfile | tail -n 200</aml-block:Name> <aml-block:Data
encoding="plain">
<![CDATA[syslog_show:: command: 1055 param_count: 0
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
<ch:Device>
<rme:Chassis xmlns:rme="http://www.cisco.com/rme/4.0">
<rme:Model>DS-C9513</rme:Model>
<rme:HardwareVersion>0.205</rme:HardwareVersion>
<rme:SerialNumber>FHH0927006V</rme:SerialNumber>
</rme:Chassis>
</ch:Device>
</ch:CallHome>
</aml-block:Content>
</aml-block:Block>
</soap-env:Body>
</soap-env:Envelope>
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Event Triggers
This section discusses Call Home trigger events. Trigger events are divided into categories, with each
category assigned CLI commands to execute when the event occurs. The command output is included in
the transmitted message. Table 62-2 lists the trigger events.
Table 62-2 Event Triggers
Call Home
Event Alert Group Event Name Description Message Level
Call Home System and SW_CRASH A software process has crashed with a 5
CISCO_TAC stateless restart, indicating an
interruption of a service.
System and SW_SYSTEM_INCONSISTEN Inconsistency detected in software or file 5
CISCO_TAC T system.
Environmental TEMPERATURE_ALARM Thermal sensor indicates temperature 6
and reached operating threshold.
CISCO_TAC POWER_SUPPLY_FAILURE Power supply failed. 6
FAN_FAILURE Cooling fan has failed. 5
Line Card LINECARD_FAILURE Line card hardware operation failed. 7
Hardware and POWER_UP_DIAGNOSTICS_ Line card hardware failed power-up 7
CISCO_TAC FAILURE diagnostics.
Line Card PORT_FAILURE Hardware failure of interface port(s). 6
Hardware and
CISCO_TAC
Line Card BOOTFLASH_FAILURE Failure of boot compact Flash card. 6
Hardware,
Supervisor
Hardware, and
CISCO_TAC
Supervisor NVRAM_FAILURE Hardware failure of NVRAM on 6
Hardware and Supervisor hardware.
CISCO_TAC
Supervisor FREEDISK_FAILURE Free disk space is below a threshold on 6
Hardware and Supervisor hardware.
CISCO_TAC
Supervisor SUP_FAILURE Supervisor hardware operation failed. 7
Hardware and POWER_UP_DIAGNOSTICS_ Supervisor hardware failed power-up 7
CISCO_TAC FAILURE diagnostics.
Supervisor INBAND_FAILURE Failure of in-band communications path. 7
Hardware and
CISCO_TAC
Supervisor EOBC_FAILURE Ethernet out-of-band channel 6
Hardware and communications failure.
CISCO_TAC
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Call Home
Event Alert Group Event Name Description Message Level
Call Home Supervisor MGMT_PORT_FAILURE Hardware failure of management 5
Hardware and Ethernet port.
CISCO_TAC
License LICENSE_VIOLATION Feature in use is not licensed, and are 6
turned off after grace period expiration.
Inventory Inventory and COLD_BOOT Switch is powered up and reset to a cold 2
CISCO_TAC boot sequence.
HARDWARE_INSERTION New piece of hardware inserted into the 2
chassis.
HARDWARE_REMOVAL Hardware removed from the chassis. 2
Test Test and TEST User generated test. 2
CISCO_TAC
Port syslog Syslog-group- SYSLOG_ALERT Syslog messages corresponding to the 5
port port facility.
RMON RMON RMON_ALERT RMON alert trigger messages. 2
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Severity levels range from 0 to 9, with 9 having the highest urgency. Each syslog level has keywords and
a corresponding syslog level as listed in Table 62-4.
Note Call Home does not change the syslog message level in the message text. The syslog message texts in
the Call Home log appear as they are described in the Cisco MDS 9000 Family System Messages Guide.
Note Call Home severity levels are not the same as system message logging severity levels (see Chapter 61,
Configuring System Message Logging and the Cisco MDS 9000 Family System Messages Guide).
Message Contents
The following contact information can be configured on the switch:
Name of the contact person
Phone number of the contact person
E-mail address of the contact person
Mailing address to which replacement parts must be shipped, if required
Site ID of the network where the site is deployed
Contract ID to identify the service contract of the customer with the service provider
Table 62-5 describes the short text formatting option for all message types.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 62-6, Table 62-7, and Table 62-8 display the information contained in plain text and XML
messages.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 62-9 lists the default Call Home settings.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters Default
Destination message size for a message sent in full text format. 500,000
Destination message size for a message sent in XML format. 500,000
Destination message size for a message sent in short text format. 4000
DNS or IP address of the SMTP server to reach the server if no 25
port is specified.
Alert group association with profile. All
Format type. XML
Call Home message level. 0 (zero)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 63
Configuring Fabric Configuration Servers
This chapter describes the Fabric Configuration Server (FCS) feature provided in the Cisco MDS 9000
Family of directors and switches. It includes the following sections:
About FCS, page 63-1
Displaying FCS Discovery, page 63-3
Displaying FCS Elements, page 63-3
Creating an FCS Platform, page 63-4
Displaying FCS Fabric Ports, page 63-5
Default Settings, page 63-6
About FCS
The Fabric Configuration Server (FCS) provides discovery of topology attributes and maintains a
repository of configuration information of fabric elements. A management application is usually
connected to the FCS on the switch through an N port. The FCS views the entire fabric based on the
following objects:
Interconnect element (IE) objectEach switch in the fabric corresponds to an IE object. One or
more IE objects form a fabric.
Port objectEach physical port in an IE corresponds to a port object. This includes the switch ports
(xE, Fx, and TL ports) and their attached Nx ports.
Platform objectA set of nodes may be defined as a platform object to make it a single manageable
entity. These nodes are end-devices (host systems, storage subsystems) attached to the fabric.
Platform objects reside at the edge switches of the fabric.
Each object has its own set of attributes and values. A null value may also be defined for some attributes.
In the Cisco MDS 9000 Family switch environment, multiple VSANs constitute a fabric, where one
instance of the FCS is present per VSAN.
As of Cisco NX-OS Release 4.1(1), FCS supports the discovery of virtual devices. The fcs
virtual-device-add command, issued in FCS configuration submode, allows you to discover virtual
devices in a particular VSAN or in all VSANs. The devices that are zoned for IVR must be discovered
with this command and have request domain_ID (RDI) enabled, before activating the IVR zone set.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
If you have attached a management application to a switch, all the frames directed towards the FCS in
the switch are part of the port VSAN in the switch port (Fx port). Your view of the management
application is limited only to this VSAN. However, information about other VSANs that this switch is
part of can be obtained either through the SNMP or CLI.
In Figure 63-1 Management Application 1 (M1) is connected through an F port with port VSAN ID 1,
and Management Application 2 (M2) is connected through an F port with port VSAN ID 2. M1 can query
the FCS information of switches S1 and S3, and M2 can query switches S3 and S4. Switch S2
information is not known to both of them. FCS operations can be done only on those switches that are
visible in the VSAN. Note that M2 can send FCS requests only for VSAN 2 even though S3 is also a part
of VSAN 1.
Management
Application 2
(port VSAN=2)
F port
Switch 3 VSAN 2
VSAN 1 (dFCS3)
ISL1
ISL2
N port
Management Switch 1 Switch 4
Application 1 (dFCS1) (dFCS4)
F port
(port VSAN=1)
ISL3
Switch 2
(dFCS2)
VSAN 3
85581
Significance of FCS
This section lists the significance of FCSs.
FCSs support network management including the following:
N port management application can query and obtain information about fabric elements.
SNMP manager can use the FCS management information base (MIB) to start discovery and
obtain information about the fabric topology.
FCSs support TE and TL ports in addition to the standard F and E ports.
FCS can maintain a group of modes with a logical name and management address when a platform
registers with it. FCSs maintain a backup of all registrations in secondary storage and update it with
every change. When a restart or switchover happens, FCSs retrieve the secondary storage
information and rebuild its database.
SNMP manager can query FCSs for all IEs, ports, and platforms in the fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Enter the VSAN ID, or select the ID from the drop-down list of available VSAN IDs.
Step 5 Enter the Fabric Configuration Server name in the Name field.
Step 6 Choose the type of server (Gateway, Host, Storage).
Step 7 Enter the WWNs for the server.
Step 8 Enter the management addresses for the server.
Step 9 Click Create to create the server, or click Close to discard your changes and return to the Fabric Config
Server dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 63-1 lists the default FCS settings.
Parameters Default
Global checking of the platform name Disabled.
Platform node type Unknown.
PA R T 9
Traffic Management
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 64
Configuring Fabric Congestion Control and QoS
Fibre Channel Congestion Control (FCC) is a Cisco proprietary flow control mechanism that alleviates
congestion on Fibre Channel networks.
Quality of service (QoS) offers the following advantages:
Provides relative bandwidth guarantee to application traffic.
Controls latency experienced by application traffic.
Prioritizes one application over another (for example, prioritizing transactional traffic over bulk
traffic) through bandwidth and latency differentiation.
This chapter provides details on the QoS and FCC features provided in all switches. It includes the
following sections:
FCC, page 64-1
QoS, page 64-3
Example Configuration, page 64-10
Ingress Port Rate Limiting, page 64-11
Default Settings, page 64-12
FCC
FCC reduces the congestion in the fabric without interfering with the standard Fibre Channel protocols.
This section contains the following topics:
About FCC, page 64-1
FCC Process, page 64-2
Enabling FCC, page 64-2
Assigning FCC Priority, page 64-3
About FCC
The FCC protocol increases the granularity and the scale of congestion control applied to any class of
traffic (see Figure 64-1).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
79943
Switch 1 Switch 2 Switch 3
Edge quench congestion control provides feedback to the source about the rate at which frames should
be injected into the network (frame intervals).
Note FCC is not supported on the Cisco Fabric Switch for HP c-Class BladeSystem and Cisco Fabric Switch
for IBM BladeCenter.
FCC Process
When a node in the network detects congestion for an output port, it generates an edge quench message.
These frames are identified by the Fibre Channel destination ID (DID) and the source ID. A switch from
other vendors simply forwards these frames.
Any receiving switch in the Cisco MDS 9000 Family handles frames in one of these ways:
It forwards the frame.
It limits the rate of the frame flow in the congested port.
The behavior of the flow control mechanism differs based on the Fibre Channel DID:
If the Fibre Channel DID is directly connected to one of the switch ports, the input rate limit is
applied to that port.
If the destination of the edge quench frame is a Cisco domain or the next hop is a Cisco MDS 9000
Family switch, the frame is forwarded.
If neither of these mechanisms is true, then the frame is processed in the port going towards the FC
DID.
All switches (including the edge switch) along the congested path process path quench frames. However,
only the edge switch processes edge quench frames.
Enabling FCC
By default, the FCC protocol is disabled. FCC can only be enabled for the entire switch.
Tip If you enable FCC, be sure to enable it in all switches in the fabric.
To enable or disable the FCC feature using Fabric Manager, follow these steps:
Step 1 Expand Switches, expand FC Services and then select FCC in the Physical Attributes pane.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The FCC information is displayed in the Information pane. The General tab is the default.
Step 2 Select the switch on which you want to enable FCC.
Step 3 Check the Enable check box.
Step 4 Click Apply Changes to save your changes.
Step 1 Expand Switches, expand FC Services and then select FCC in the Physical Attributes pane.
The FCC information is displayed in the Information pane. The General tab is the default.
Step 2 Select the switch for which you want to assign the FCC priority.
Step 3 Enter the priority in the Priority column.
Step 4 Click Apply Changes to save your changes.
QoS
QoS implementation in the Cisco MDS 9000 Family follows the differentiated services (DiffServ)
model. The DiffServ standard is defined in RFCs 2474 and 2475.
All switches support the following types of traffic:
About Control Traffic, page 64-3
Enabling or Disabling Control Traffic, page 64-4
About Data Traffic, page 64-4
VSAN Versus Zone-Based QoS, page 64-5
Configuring Data Traffic, page 64-6
About Class Map Creation, page 64-6
Creating a Class Map, page 64-7
About Service Policy Definition, page 64-8
About Service Policy Enforcement, page 64-8
About the DWRR Traffic Scheduler Queue, page 64-8
Changing the Weight in a DWRR Queue, page 64-9
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip We do not recommend disabling this feature as all critical control traffic is automatically assigned the
lowest priority once you issue this command.
Toenable or disable the high priority assignment for control traffic using Fabric Manager, follow these
steps:
Step 1 Expand Switches, expand FC Services and then select QoS in the Physical Attributes pane.
The QoS control traffic information is displayed in the Information pane. The Control tab is default.
Step 2 Select the switch on which you want to enable or disable control traffic.
Step 3 In the Command column, click the drop-down menu and select enable or disable.
Step 4 Click Apply Changes to save your changes.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
OLTP server
Disk
FC
Congestion
VOQ(s) VOQ(s)
Backup server
Absolute Absolute
High High
Medium Medium
Low Low
105228
Switch 1 Switch 2
In Figure 64-2, the OLTP traffic arriving at Switch 1 is marked with a high priority level of throughput
classification (class map) and marking (policy map). Similarly, the backup traffic is marked with a low
priority level. The traffic is sent to the corresponding priority queue within a virtual output queue (VOQ).
A deficit weighted round robin (DWRR) scheduler configured in the first switch ensures that high
priority traffic is treated better than low priority traffic. For example, DWRR weights of 70:20:10 implies
that the high priority queue is serviced at 7 times the rate of the low priority queue. This guarantees lower
delays and higher bandwidths to high priority traffic if congestion sets in. A similar configuration in the
second switch ensures the same traffic treatment in the other direction.
If the ISL is congested when the OLTP server sends a request, the request is queued in the high priority
queue and is serviced almost immediately since the high priority queue is not congested. The scheduler
assigns its priority over the backup traffic in the low priority queue.
Note When the high priority queue does not have traffic flowing through, the low priority queue uses all the
bandwidth and is not restricted to the configured value.
A similar occurrence in Switch 2 sends a response to the transaction request. The round trip delay
experienced by the OLTP server is independent of the volume of low priority traffic or the ISL
congestion. The backup traffic uses the available ISL bandwidth when it is not used by the OLTP traffic.
Tip To achieve this traffic differentiation, be sure to enable FCC (see the Enabling FCC section on
page 64-2).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
See the About Zone-Based Traffic Priority section on page 30-36 for details on configuring a
zone-based QoS policy.
Tip QoS is supported in interoperability mode. For more information, refer to the Cisco MDS 9000 Family
Switch-to-Switch Interoperability Configuration Guide.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip The order of entries to be matched within a class map is not significant.
Step 1 Expand Switches, expand FC Services and then select QoS in the Physical Attributes pane.
The QoS information is displayed in the Information pane shown in Figure 64-3. The Control tab is the
default.
Step 2 In the Class Maps tab, click Create Row to create a new class map.
You see the Create Class Maps dialog box shown in Figure 64-4.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Refer to
http://www.cisco.com/en/US/tech/tk543/tk757/technologies_tech_note09186a00800949f2.shtml for
further information on implementing QoS DSCP values.
Note Class maps are processed in the order in which they are configured in each policy map.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 64-2 QoS Behavior for Generation 1 and Generation 2 Switching Modules
Step 1 Expand Switches, expand FC Services and then select QoS in the Physical Attributes pane.
The QoS control traffic information is displayed in the Information pane shown in Figure 64-5. The
default is the Control tab.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Example Configuration
This section describes a configuration example for the application illustrated in Figure 64-7.
OLTP server
Disk
21:00:00:0c:50:02:ca:b5 22:00:00:04:cf:22:eb:dc FC
Congestion
VOQ(s) VOQ(s)
Backup server
Absolute Absolute
High High
Low Low
130667
Switch 1 Switch 2
Both the OLTP server and the backup server are accessing the disk. The backup server is writing large
amounts of data to the disk. This data does not require specific service guarantees. The volumes of data
generated by the OLTP server to the disk are comparatively much lower but this traffic requires faster
response because transaction processing is a low latency application.
The point of congestion is the link between Switch 2 and the disk, for traffic from the switch to the disk.
The return path is largely uncongested as there is little backup traffic on this path.
Service differentiation is needed at Switch 2 to prioritize the OLTP-server-to-disk traffic higher than the
backup-server-to-disk traffic.
To configure traffic prioritization for the example application, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Congestion could occur anywhere in the example configuration. To address congestion of the return path
at both switches, you need to create two more class maps and include them in the policy map as follows:
Note Port rate limiting can only be configured on Cisco MDS 9100 Series switches, Cisco MDS 9216i
switches, and MPS-14/2 modules.
This feature can only be configured if the QoS feature is enabled and if this configuration is performed
on a Cisco MDS 9100 series switch, Cisco MDS 9216i switch, or MPS-14/2 module.
To configure the port rate limiting value using Fabric Manager, follow these steps:
Step 1 Expand Switches, expand FC Services and then select QoS in the Physical Attributes pane.
The QoS control traffic information is displayed in the Information pane shown in Figure 64-8. The
default is the Control tab.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select the switch whose port rate limit you want to change.
Step 4 Enter the desired port rate limit in the Percent column.
Step 5 Click the Apply Changes icon to save your changes.
Default Settings
Table 64-3 lists the default settings for FCC, QoS, and rate limiting features.
.
Table 64-3 Default FCC, QoS, and Rate Limiting Settings
Parameters Default
FCC protocol Disabled.
QoS control traffic Enabled.
QoS data traffic Disabled.
Zone-based QoS priority Low.
Rate limit 100%
CH A P T E R 65
Configuring Port Tracking
The port tracking feature is unique to the Cisco MDS 9000 Family of switches. This feature uses
information about the operational state of the link to initiate a failure in the link that connects the edge
device. This process of converting the indirect failure to a direct failure triggers a faster recovery process
towards redundant links. When enabled, the port tracking feature brings down the configured links based
on the failed link and forces the traffic to be redirected to another redundant link.
This chapter includes the following sections:
About Port Tracking, page 65-1
Port Tracking, page 65-2
Default Port Tracking Settings, page 65-6
ISL2
WAN or
X MAN
Direct link 1
X
FC FC
WAN or
120490
MAN
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The port tracking feature monitors and detects failures that cause topology changes and brings down the
links connecting the attached devices. When you enable this feature and explicitly configure the linked
and tracked ports, the Cisco NX-OS software monitors the tracked ports and alters the operational state
of the linked ports on detecting a link state change.
The following terms are used in this chapter:
Tracked portsA port whose operational state is continuously monitored. The operational state of
the tracked port is used to alter the operational state of one or more ports. Fibre Channel, VSAN,
PortChannel, FCIP, or a Gigabit Ethernet port can be tracked. Generally, ports in E and TE port
modes can also be Fx ports.
Linked portsA port whose operational state is altered based on the operational state of the tracked
ports. Only a Fibre Channel port can be linked.
Port Tracking
Before configuring port tracking, consider the following guidelines:
Verify that the tracked ports and the linked ports are on the same Cisco MDS switch.
Be aware that the linked port is automatically brought down when the tracked port goes down.
Do not track a linked port back to itself (for example, Port fc1/2 to Port fc2/5 and back to Port fc1/2)
to avoid recursive dependency.
This section includes the following topics:
About Port Tracking, page 65-2
Enabling Port Tracking, page 65-3
About Configuring Linked Ports, page 65-3
Operationally Binding a Tracked Port, page 65-3
About Tracking Multiple Ports, page 65-5
Tracking Multiple Ports, page 65-5
About Monitoring Ports in a VSAN, page 65-6
Monitoring Ports in a VSAN, page 65-6
About Forceful Shutdown, page 65-6
Forcefully Shutting Down a Tracked Port, page 65-6
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Expand Switches, expand Interfaces, and then select Port Tracking in the Physical Attributes pane.
The port tracking information is displayed in the Information pane shown in Figure 65-2. The default is
the Controls tab.
Step 1 Expand Switches, expand Interfaces, and then select Port Tracking in the Physical Attributes pane.
The port tracking information is displayed in the Information pane. The default is the Controls tab.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Select the switch whose ports you want to track by and selecting a switch from the drop-down list.
Step 5 Select the linked port(s) that should be bound to the tracked port(s) by clicking the browse button and
selecting from the list.
Step 6 Click the Single VSAN radio button if you want to track these ports only in one VSAN or click the All
VSANs radio button if you want to track these ports in all the available VSANs.
See About Monitoring Ports in a VSAN section on page 65-6 for details.
Step 7 If you chose Single VSAN in the previous step, enter the ID of the VSAN where these ports will be
monitored.
Step 8 Check the Forceshut check box if you want to forcefully shutdown the tracked port.
See About Forceful Shutdown section on page 65-6 for details.
Step 9 Click Create to proceed with creating this dependency.
If tracking is established, you see Success in the lower left corner of the dialog box (see Figure 65-5).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Port Channel
2
WAN or
fc 8/6
X MAN
1
X FCIP
FC FC
3
X
WAN or
120491
MAN
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tip The specified VSAN does not have to be the same as the port VSAN of the linked port.
Tip If you configure this feature, the linked port continues to remain in the shutdown state even after the
tracked port comes back up. You must explicitly remove the forced shut state (by administratively
bringing up this interface) of the linked port once the tracked port is up and stable.
Parameters Default
Port tracking Disabled.
Operational binding Enabled along with port tracking.
PA R T 10
Troubleshooting
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 66
Troubleshooting Your Fabric
This chapter describes basic troubleshooting methods used to resolve issues with switches. This chapter
contains the following sections:
Troubleshooting Tools and Techniques, page 66-1
Analyzing Switch Device Health, page 66-3
Analyzing Switch Fabric Configuration, page 66-4
Analyzing End-to-End Connectivity, page 66-5
Using the Ping Tool (fcping), page 66-7
Using Traceroute (fctrace) and Other Troubleshooting Tools, page 66-7
Analyzing the Results of Merging Zones, page 66-8
Using the Show Tech Support Command, page 66-9
Running CLI Commands, page 66-10
Locating Other Switches, page 66-12
Getting Oversubscription Information in Device Manager, page 66-14
Fibre Channel Time Out Values, page 66-14
Configuring a Fabric Analyzer, page 66-17
Configuring World Wide Names, page 66-23
Configuring a Secondary MAC Address, page 66-23
FC ID Allocation for HBAs, page 66-24
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Traffic AnalyzerAnother option is to launch the Cisco Traffic Analyzer for Fibre Channel from the
Fabric Manager Server to analyze the traffic in greater depth. The Cisco Traffic Analyzer allows you to
breakdown traffic by VSANs and protocols and to examine SCSI traffic at a logical unit number (LUN)
level.
Protocol AnalyzerIf even deeper investigation is needed, the Cisco Protocol Analyzer for Fibre
Channel can be launched in-context from the Cisco Traffic Analyzer. The Cisco Protocol Analyzer
enables you to examine actual sequences of Fibre Channel frames easily using the Fibre Channel and
SCSI decoders Cisco developed for Ethereal.
Port Analyzer AdapterFabric Manager Server and Device Manager use SNMP to gather statistics.
They fully utilize the built in MDS statistics counters. Even so, there are limits to what the counters can
collect.
Integration with the Cisco Traffic Analyzer and Cisco Protocol Analyzer extend the MDS analysis
capabilities by analyzing the Fibre Channel traffic itself. The Cisco MDS 9000 Family Switched Port
Analyzer (SPAN) enables these solutions via a flexible, non-intrusive technique to mirror traffic
selectively from one or more ports to another MDS port within a fabric.
The Cisco Port Analyzer Adapter (PAA) encapsulates SPAN traffic in an Ethernet header for transport
to a PC or workstation for analysis. Both Fibre Channel control and data plane traffic are available using
SPAN. The PAA broadcasts the Ethernet packets, so they cannot be routed across IP networks. Hubs and
switches can be used, provided they are in the same Ethernet subnet. Direct connections between a PAA
and the PC are also supported. The PAA can reduce Ethernet traffic by truncating Fibre Channel data.
Both the Cisco Traffic Analyzer and Cisco Protocol Analyzer require the PAA to transport MDS SPAN
traffic to a PC or workstation.
Note The Cisco Traffic Analyzer works best with the Cisco Port Analyzer Adapter 2, because it provides a
length value for truncated data, enabling accurate byte count reporting.
Note The aggregation capabilities are restricted to the information collect by Ethernet connections to a single
PC. Aggregation across multiple PCs is NOT available.
The Cisco Traffic Analyzer presents it reports through a Web server, so you can view them locally or
remotely. The traffic analysis functions are provided by ntop open-source software, which was
enhanced by Cisco to add Fibre Channel and SCSI analysis and MDS enhanced inter-switch link (ISL)
header support for SPAN. ntop is available on the Cisco.com software download center, under the Cisco
Port Analyzer Adapter. ntop is also available on the Internet at http://www.ntop.org/ntop.html. The Cisco
enhanced ntop runs under Microsoft Windows and Linux operating systems.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
The Cisco Traffic Analyzer for Fibre Channel presents reports with network wide statistics. The
Summary Traffic report shows what percentage of traffic was within different ranges of frames sizes. A
breakdown of the percentage of traffic for each protocol such as SCSI, ELS is provided. The average and
peak throughput for the SPAN traffic being analyzed are also provided.
Fibre Channel traffic can be analyzed on a per VSAN basis with the Cisco Traffic Analyzer. The Domain
Traffic Distribution graphs indicate how much traffic (bytes) were transmitted or received by a switch
for a particular VSAN. FC Traffic Matrix graphs show how much traffic is transmitted and received
between Fibre Channel sources and destinations. The total byte and frame counts for each VSAN are
also provided.
Statistics can be analyzed for individual host and storage ports. You can see the percentage of SCSI read
versus write traffic, SCSI vs. other traffic, and percentage of transmitted versus received bytes and
frames. The peak and average throughput values are available for data transmitted and received by each
port.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Click Clear to remove the contents of the Switch Health Analysis window.
Step 4 Click Close to close the window.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 6 Check the check boxes in the Resolve column for the issues you want to resolve.
Step 7 To resolve, click Resolve Issues.
Step 8 Click Clear to remove the contents of the window.
Step 9 Click Close to close the window.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 7 Check the Report errors for check box to see a report of zone and device errors.
Step 8 Click Analyze.
The End to End Connectivity Analysis window displays the selected endpoints including the switch to
which each is attached, and the source and target ports used to connect it, as shown in Figure 66-3.
The output shows all the requests that have failed. The possible descriptions are:
Ignoring empty zoneNo requests are issued for this zone.
Ignoring zone with single memberNo requests are issued for this zone.
Source/Target are unknownNo name server entries exist for the ports or we have not discovered
the port during discovery.
Both devices are on the same switch.
No paths exist between the two devices.
VSAN does not have an active zone set and the default zone is denied.
Average time micro secsThe latency value was more than the threshold supplied.
Step 9 Click Clear to remove the contents of the window.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Tools > Connectivity > Ping. You can also select it from the right-click context menus for hosts
and storage devices in the Fabric pane.
You see the Ping dialog box.
Step 2 Select the source switch from the Source Switch drop-down list.
Step 3 Select the VSAN in which you want to verify connectivity from the VSAN drop-down list.
Step 4 Select the target end port for which to verify connectivity from the Target Endport drop-down list.
Step 5 Click Start to perform the ping between your switch and the selected port.
You see the results in the dialog box shown in Figure 66-4.
Step 6 Click Clear to clear the contents of the window and perform another ping, or click Close to close the
window.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 3 Select the VSAN for which to verify connectivity from the VSAN drop-down list.
Step 4 Select the target end port for which to verify connectivity from the Target Endport drop-down list.
Step 5 Click Start to perform the traceroute between your switch and the selected port.
You see the results at the bottom of the dialog box as shown in Figure 66-5.
Step 6 Click Clear to clear the contents of the window and perform another traceroute, or click Close to close
the window.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 8 If prompted, enter your user name and password in the appropriate fields for the switch in question.
Note In order for Fabric Manager to successfully issue the show tech support command on a switch,
that switch must have this user name and password. Fabric Manager is unable to log into a switch
that does not have a user name and password and an error is returned for that switch.
Note If you would like to view output files of the show tech support command without using Fabric
Manager, open them with any text editor. Each file is named with the switchs IP address and has
a .TXT extension (for example, 111.22.33.444.txt).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Deselect the check box for the switch(es) for which you do not want to run CLI commands.
Step 3 Specify where you want the file to be saved.
Note A separate report is issued for each switch. Check the reports to verify whether a CLI command
failed.
Step 4 Enter the command(s) in the Command(s) text box. If the commands are configuration mode commands,
you must also enter the exit command.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note Starting in 2007, daylight savings time in the United States starts on the second Sunday in March and
ends on the first Sunday in November.
You can use the Run CLI Commands feature in Fabric Manager to adjust the time change configuration
in your switches. Enter the following commands in the Command(s) text box.
config t
no clock summer-time
clock summer-time daylight_timezone_name 2 Sunday March 02:00 1 Sunday November 02:00 60
exit
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To locate switches that are not included in the currently discovered fabric using Fabric Manager, follow
these steps:
Note The number in the lower left corner of the screen increments as the device locator attempts to
discover the devices in your network fabric. When the discovery process is complete, the number
indicates the number of rows displayed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Right-click the module you want to check for oversubscription and select Check Oversubscription
from the pop-up menu.
You see the Check Oversubscription dialog box shown in Figure 66-11.
Note The module must be capable of oversubscription in order for you to see this menu item.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution The D_S_TOV, E_D_TOV, and R_A_ TOV values cannot be globally changed unless all VSANs in the
switch are suspended.
Step 1 Select SAN in the Logical Domains pane to include all VSANs.
Step 2 Expand Switches, expand FC Services and select Timers & Policies in the Physical Attributes pane.
You see the timers for switches in the Information pane.
Step 3 Click Change Timeouts to configure the time-out values.
You see the Change Timeouts dialog box shown in Figure 66-12.
Step 4 Indicate values for R_A_TOV (Resource Allocation Time Out Value), D_S_TOV (Distributed Services
Time Out Value), and E_D_TOV (Error Detect Time Out Value).
Step 5 Click Apply.
Step 6 Click Close to close the dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Select a network from the drop-down list and specify a switch.
Step 3 Check the check boxes for InOrderDeliver and/or Trunk Protocol.
Step 4 Click Apply.
Step 5 Click Close to close the dialog box.
Caution You cannot perform a nondisruptive downgrade to any earlier version that does not support per-VSAN
FC timers.
Note This configuration must be propagated to all switches in the fabricbe sure to configure the same value
in all switches in the fabric.
If a switch is downgraded to Cisco MDS SAN-OS Release 1.2 or 1.1 after the timer is configured for a
VSAN, an error message is issued to warn against strict incompatibilities.
To configure per-VSAN FC timers using Fabric Manager, follow these steps:
Step 1 Choose the VSAN for timer configuration from the Logical Domains pane. If a VSAN is not specified
when you change the policies, the changed value is applied to all VSANs in the switch.
Step 2 Expand Switches, expand FC Services and select Timers & Policies in the Physical Attributes tree.
You see timeouts for only switches in the selected VSAN shown in the Information pane.
Step 3 Click Change Timeouts to configure the time-out values.
You see the dialog box shown in Figure 66-14
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The Cisco Fabric Analyzer is useful in capturing and decoding control traffic, not data traffic. It is
suitable for control path captures, and is not intended for high-speed data path captures.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
FC analyzer
IP IP RS-232
network network (Serial console)
10/100 Ethernet
(00B Mgmt)
FC analyzer
Fibre Channel
85482
fabric
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Using capture filters, you can limit the amount of traffic that is actually sent to the client. Capture filters
are specified at the client endon Ethereal, not on the switch.
GUI-Based Client
The Ethereal software runs on a host, such as a PC or workstation, and communicates with the remote
capture daemon. This software is available in the public domain from http://www.ethereal.com. The
Ethereal GUI front-end supports a rich interface such as a colorized display, graphical assists in defining
filters, and specific frame searches. These features are documented on Ethereals website.
While remote capture through Ethereal supports capturing and decoding Fibre Channel frames from a
Cisco MDS 9000 Family switch, the host running Ethereal does not require a Fibre Channel connection
to the switch. The remote capture daemon running on the switch sends the captured frames over the
out-of-band Ethernet management port. This capability allows you to capture and decode Fibre Channel
frames from your desktop or laptop.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution You must use the eth2 interface to capture control traffic on a supervisor module.
For example:
rpcap://cp-16/eth2
rpcap://17.2.1.1/eth2
The capture interface can be specified either in the capture dialog box or by using the -i option at
the command line when invoking Ethereal.
ethereal -i rpcap://<ipaddress|hostname>[:<port>]/<interface>
For example:
ethereal -i rpcap://172.22.1.1/eth2
or
ethereal -i rpcap://customer-switch.customer.com/eth2
Note For example, in a Windows 2000 setup, click Start on your desktop and select Run. In the
resulting Run window, type the required command line option in the Open field.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note This GUI-assisted feature is part of Ethereal and you can obtain more information from
http://www.ethereal.com.
Capture Filters
You can limit what frames are captured by using the capture filters feature in a remote capture. This
feature limits the frames that are captured and sent from the remote switch to the host. For example, you
can capture only class F frames. Capture filters are useful in restricting the amount of bandwidth
consumed by the remote capture.
Unlike display filters, capture filters restrict a capture to the specified frames. No other frames are visible
until you specify a completely new capture.
The syntax for capture filter is different from the syntax for display filters. Capture filters use the
Berkeley Packet Filter (BPF) library that is used in conjunction with the libpcap freeware. The list of all
valid Fibre Channel capture filter fields are provided later in this section.
Procedures to configure capture filters are already documented in the Ethereal website
(http://www.ethereal.com). Some examples of how you can use this feature as follows:
To capture frames only on a specified VSAN, use this expression:
vsan = 1
To capture only class Fibre Channel ELS frames, use this expression:
els
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note This feature is part of libpcap and you can obtain more information from http://www.tcpdump.org.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Changes to the world-wide names should be made by an administrator or individual who is completely
familiar with switch operations.
Note As of Cisco NX-OS Release 4.1(1), the ELP is enhanced to be compliant with FC-SW-3.
Step 1 Select a SAN (or a VSAN) from the Logical Domains pane.
You see a list of switches in the Information pane.
Step 2 Expand Switches, expand FC Services and select WWN Manager in the Physical Attributes pane.
Step 3 In the Information pane, scroll until you see the switch on which you want to configure a secondary MAC
address (see Figure 66-16).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 Enter the secondary MAC address in the Secondary Mac Base field.
Step 5 Enter the range for the secondary MAC address in the Secondary Mac Range field.
Step 6 Click the Apply Changes icon.
Step 1 Select a SAN (or a VSAN) from the Logical Domains pane.
You see a list of switches in the Information pane.
Step 2 Choose Switches > FC Services > WWN Manager from the Physical Attributes pane.
You see the WWN information for each switch in the SAN or VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 66-2 lists the default settings for the features included in this chapter.
Parameters Default
CIM server Disabled
CIM server security protocol HTTP
D_S_TOV 5,000 milliseconds.
E_D_TOV 2,000 milliseconds.
R_A_TOV 10,000 milliseconds.
Time-out period to invoke fctrace 5 seconds.
Number of frame sent by the fcping feature 5 frames.
Remote capture connection protocol TCP.
Remote capture connection mode Passive.
Local capture frame limit s 10 frames.
FC ID allocation mode Auto mode.
Loop monitoring Disabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 67
Management Software FAQ
This chapter answers some of the most frequently asked questions about Cisco Fabric Manager and
Device Manager. This chapter contains the following topics:
Installation Issues, page 67-3
When installing Fabric Manager from windows, why does clicking install fail?, page 67-3
Why do I have trouble launching Fabric Manager on Solaris?, page 67-3
What do I do if my browser prompts to save JNLP files?, page 67-3
What do I do if I see a "Java Web Start not detected" error?, page 67-4
What do I do if my desktop shortcuts not visible?, page 67-4
How do I upgrade to a newer version of Fabric Manager or Device Manager?, page 67-4
How do I downgrade Fabric Manager or Device Manager?, page 67-4
What do I do if an upgrade is not working?, page 67-4
What do I do if Java Web Start hangs on the download dialog?, page 67-5
How do I manually configure a browser for Java Web Start?, page 67-5
How do I run Java Web Start from the command line?, page 67-5
How do I clear the Java Web Start cache?, page 67-6
What do I do if my login does not work in Fabric Manager or Device Manager?, page 67-6
What do I do if I cannot install Fabric Manager or Device Manager, or run Java, when
pcAnyWhere is running?, page 67-6
What do I do if the Fabric Manager or Performance Manager service shows up as disabled in
the Services menu?, page 67-6
What do I do if I am unable to install Fabric Manager or Device Manager, or run Java, when
McAfee Internet Suite 6.0 Professional is running?, page 67-7
General, page 67-7
What do I do if I see errors while monitoring Area chart graphing?, page 67-7
What do I do if I see "gen error" messages?, page 67-7
What do I do if disk images in the Device Manager Summary View are not visible?, page 67-7
What do I do if I am unable to set both the D_S_TOV and E_D_TOV timers in Device
Manager?, page 67-7
What do I do if columns in Device Manager tables are too small?, page 67-8
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
What do I do if fabric changes are not propagated onto the map (for example, links don't
disappear)?, page 67-8
What do I do if the PortChannel creation dialog becomes too small after several uses?,
page 67-8
What do I do if I see errors after IPFC configuration?, page 67-8
What do I do if Fabric Manager or Device Manager is using the wrong network interface?,
page 67-8
What do I do if I see display anomalies in Fabric Manager or Device Manager?, page 67-8
Why is the active zone set in edit zone always shown in bold (even after successful activation)?,
page 67-9
Can I create a zone with prefix IVRZ or a zone set with name nozonset?, page 67-9
What do I do when One-Click License Install fails, and I cannot connect to the Cisco website?,
page 67-9
What do I do when Fabric Manager client and Device Manager cannot connect to the switch?,
page 67-10
How do I increase the log window size in Fabric Manager Client?, page 67-10
When do I do when the FM Server Database fails to start or has a file locking error?, page 67-10
Windows Issues, page 67-11
What do I do when text fields show up too small, and I cannot enter any data?, page 67-11
What do I do when printing causes an application crash?, page 67-11
What do I do when Windows XP hangs (or I see a blue screen)?, page 67-11
What do I do when Fabric Manager and Device Manager Icons Disappear?, page 67-11
What do I do when Device Manager or Fabric Manager window content disappears in Windows
XP?, page 67-11
What do I do when SCP/SFTP fails when a file is copied from local machine to the switch?,
page 67-12
UNIX Issues, page 67-12
What do I do when the parent Menus Disappear?, page 67-12
What do I do when the web browser cannot find web server even it is running?, page 67-12
How do I fix a "too many open files" error?, page 67-12
Other, page 67-13
How do I set the map layout so it stays after Fabric Manager restarted?, page 67-13
What do I do when two switches show on the map, but there is only one switch?, page 67-13
What does a red/orange/dotted line through the switch mean?, page 67-13
How do I upgrade without losing map settings?, page 67-19
How do I preserve historical data when moving Fabric Manager server to new host?, page 67-19
Are there restrictions when using Fabric Manager across FCIP?, page 67-19
How do I fix a "Please insure that FM server is running on localhost" message?, page 67-20
How do I run Cisco Fabric Manager with multiple interfaces?, page 67-20
How do I configure an HTTP proxy server?, page 67-21
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Installation Issues
When installing Fabric Manager from windows, why does clicking install fail?
To make sure that Java Web Start is installed properly, follow these steps:
Step 1 Go to the Programs menu and see if Java Web Start is there.
Step 2 Start the Java Web Start program to make sure there is no problem with the Java Runtime installation.
Step 3 Click the Preferences tab, and make sure the proxies settings are fine for Web Start.
Step 4 Check that your browser is set up to handle JNLP settings properly (see the How do I manually
configure a browser for Java Web Start? section on page 67-5).
If you had older versions of the application and you see an error pop-up window saying cannot open the
JNLP file (in the error details), this could be because the Java Web Start cache is messed up. To work
around this, clear the cache and retry. To clear the cache, see the How do I clear the Java Web Start
cache? section on page 67-6.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
On rare occasions, we have seen the upgrade happen but the version does not change. This is because of
HTTP caching in the network. During the upgrade, HTTP requests for files on the switch get cached in
the local machine. Even though the switch is in a higher version, the management software installed is
at the old version. The workaround for this is to uninstall the Fabric/Device Manager, clear the Java Web
Start cache, and then do a clean install.
Step 1 Start Java Web Start (javaws.exe or javaws). You see the Java Web Start Application Manager.
Step 2 Choose File > Preferences > General and make sure your proxy settings are correct. For example, if
you are using an HTTP proxy, set it up here.
Step 3 Choose Use Browser.
Step 4 Click OK.
Note For Windows Users: To set up Java Web Start on *.jnlp files, select Windows Explorer > Tools > Folder
Options > File Types. Either change the existing setting for JNLP or add one so that *.jnlp files are
opened by javaws.exe. This executable is under Program Files\Java Web Start
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Start the Java Web Start Application Manager (javaws.exe or javaws).
Step 2 Go to File > Preferences > Advanced and clear the applications folder or cache. You can manually
delete the .javaws or cache directory. On Windows this is under Documents and Settings, and on UNIX
this is under $HOME.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
General
What do I do if disk images in the Device Manager Summary View are not
visible?
On some occasions the Summary View table in the Device Manager does not show the icons for disks
attached to a Fx port. This is because the FC4 features are empty for this port. A LUN discovery must
be issued to discover information about these hosts/disks that do not register their FC4 types. You can
do this in the Device Manager by clicking FC > Advanced > LUNs.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
What do I do if fabric changes are not propagated onto the map (for example,
links don't disappear)?
Fabric Manager shows that a device or port is down by displaying a red cross on that port or device.
However, Fabric Manager does not remove any information that's already discovered. You must
rediscover to correctly update the map.
What do I do if the PortChannel creation dialog becomes too small after several
uses?
After several uses, the MemberList TextBox (in the PortChannel Create Window) does not display as it
should. It changes from a long TextBox with a ComboBox for choosing ports, to a small square TextBox
that is too small to choose ports. This is a known problem and will be fixed in a future release. To work
around this problem, stop and restart Fabric Manager or Device Manager.
For example, in Windows the line looks like ".javaw.exe -Device Managerds.nmsAddress=X.X.X.X -cp
.".
In desktop shortcuts, this length could exceed the maximum characters allowed. If this happens, delete
the "-Dsun.java2d.ddoffscreen=false" portion to make more space. Newer versions of Fabric Manager
(Release 1.2 and later) allow you to pick a preferred network interface.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Some older video cards exhibit these display anomalies. To fix this, first try updating the video drivers.
If this doesn't solve the problem, replace the video card.
Why is the active zone set in edit zone always shown in bold (even after
successful activation)?
A member of this VSAN must be participating in IVR zoning. Because the IVR zones get added to active
zones, the active zone set configuration is always different from the local zone set configuration with the
same name. The zone set name is always bold.
Can I create a zone with prefix IVRZ or a zone set with name nozonset?
Do not use these special names. These names are used by the system for identifying IVR zones.
What do I do when One-Click License Install fails, and I cannot connect to the
Cisco website?
The one-click license install tries to open an HTTP connection to the Cisco website. If you do your
browsing using an HTTP proxy then the following command- line variables need to be added to your
Fabric Manager client scripts:
-Dhttps.proxyHost and -Dhttps.proxyPort.
In case your one-click install URL starts with "http://" (and not "https://"), the variables are:
-Dhttp.proxyHost and -Dhttp.proxyPort.
For example, in Windows, edit the MDS 9000\bin\FabricManager.bat file and add to the JVMARGS
"-Dhttps.proxyHost=HOSTADDRESS -Dhttps.proxyPort=HOSTPORT".
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
What do I do when Fabric Manager client and Device Manager cannot connect
to the switch?
Fabric Manager or Device Manager using SNMPv3 at Cisco MDS SAN-OS Release 1.3(3) or earlier
can't manage a switch running Release 1.3(4) or later. This might affect a software upgrade using Fabric
Manager from Release 1.3(3) to Release 1.3(4).
When do I do when the FM Server Database fails to start or has a file locking
error?
In the database log (FMPersist.log) you will see an error message "The database is already in use by
another process". The HsqlDB 1.7.1 version has this problem. The file lock problem seems to happen
occasionally, and can be resolved by shutdown and restart of the db server. On windows this can be done
by stopping and starting the FMPersist service and on Unix just run the FMPersist.sh script with the
argument restart.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Windows Issues
What do I do when text fields show up too small, and I cannot enter any data?
When Reflection X is running, certain text fields in the Fabric Manager and Device Manager are not
rendered to the full width of the field. Resize the dialog box to see the text fields properly.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
What do I do when SCP/SFTP fails when a file is copied from local machine to
the switch?
If there are embedded spaces in the file path, then windows scp/sftp might fail. You will get a
copyDeviceBusy error from the switch. In tools such as the License Wizard either make sure tftp copy
can be done or pick filenames with no spaces.
UNIX Issues
What do I do when the web browser cannot find web server even it is running?
This can happens when web browser uses proxy server. To check that for Internet Explorer, choose tools
in menu, then choose internet options, then choose connection subpanel, then click Lan Setting. A dialog
comes up, verify the proxy setting.
The problem with this workaround is that you have to make sure /tmp/.systemPrefs exists on every
box where you are using $JAVA_HOME. We recommend installing the JVM as root and on a local
disk.
User Preferences
If your home directory is NFS mounted and you are getting this problem. Do the following:
$ rm -rf $HOME/.java
$ mkdir /tmp/.java.$USER
$ ln -s /tmp/.java.$USER $HOME/.java
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Other
How do I set the map layout so it stays after Fabric Manager restarted?
If you have arranged the map to your liking and would like to freeze the map so that the objects stay
as they are even after you stop Fabric Manager and restart it again, follow these steps:
What do I do when two switches show on the map, but there is only one
switch?
If two switches show on your map, but you only have one switch, it may be that you have two switches
in a non-contiguous VSAN that have the same Domain ID. Fabric Manager uses <vsanId><domainId>
to look up a switch, and this can cause the fabric discovery to assign links incorrectly between these
errant switches.
The workaround is to verify that all switches use unique domain IDs within the same VSAN in a
physically connected fabric. (The fabric configuration checker will do this task.)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table 67-1 Fabric Manager and Device Manager Color Definitions (continued)
Tooltip Definition
adminDown The port is administratively down.
bitErrRTThresExceeded Bit error rate too high.
bundleMisCfg Misconfiguration in PortChannel membership
detected.
channelAdminDown This port is a member of a PortChannel and that
PortChannel is administratively down.
channelConfigurationInProgress This port is undergoing a PortChannel
configuration.
channelOperSuspended This port is a member of a PortChannel and its
operational parameters are incompatible with the
PortChannel parameters.
deniedDueToPortBinding Suspended due to port binding.
domainAddrAssignFailureIsolation The elected principal switch is not capable of
performing domain address manager functions so
no Nx_port traffic can be forwarded across
switches, hence all Interconnect_Ports in the
switch are isolated.
domainInvalidRCFReceived Invalid RCF received.
domainManagerDisabled Domain manager is disabled.
domainMaxReTxFailure Domain manager failure after maximum retries.
domainOtherSideEportIsolation The peer E port is isolated.
domainOverlapIsolation There is a overlap in domains while attempting to
connect two existing fabrics.
elpFailureClassFParamErr Isolated for ELP failure due to class F parameter
error.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tooltip Definition
elpFailureClassNParamErr Isolated for ELP failure due to class N parameter
error.
elpFailureInvalidFlowCTLParam Isolated for ELP failure due to invalid flow
control parameter.
elpFailureInvalidPayloadSize Isolated for ELP failure due to invalid payload
size.
elpFailureInvalidPortName Isolated for ELP failure due to invalid port name.
elpFailureInvalidSwitchName Isolated for ELP failure due to invalid switch
name.
elpFailureInvalidTxBBCredit Isolated for ELP failure due to invalid transmit
B2B credit.
elpFailureIsolation During a port initialization the prospective
Interconnect_Ports find incompatible link
parameters.
elpFailureLoopbackDetected Isolated for ELP failure due to loopback detected.
elpFailureRatovEdtovMismatch Isolated for ELP failure due to R_A_TOV or
E_D_TOV mismatch.
elpFailureRevMismatch Isolated for ELP failure due to revision mismatch.
elpFailureUnknownFlowCTLCode Isolated for ELP failure due to invalid flow
control code.
ePortProhibited Port down because FICON prohibit mask in place
for E/TE port.
eppFailure Trunk negotiation protocol failure after maximum
retries.
errorDisabled The port is not operational due to some error
conditions that require administrative attention.
escFailureIsolation During a port initialization the prospective
Interconnect_Ports are unable to proceed with
initialization as a result of Exchange Switch
Capabilities (ESC).
fabricBindingDBMismatch fabric bindingactive database mismatch with
peer.
fabricBindingDomainInvalid Peer domain ID is invalid in fabric binding active
database.
fabricBindingNoRspFromPeer Fabric binding no response from peer.
fabricBindingSWWNNotFound Peer switch WWN not found in fabric binding
active database.
fcipPortAdminCfgChange FCIP port went down due to configuration
change.
fcipPortKeepAliveTimerExpire FCIP port went down due to TCP keep alive timer
expired.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tooltip Definition
fcipPortMaxReTx FCIP port went down due to max TCP
retransmissions reached the configured limit.
fcipPortPersistTimerExpire FCIP port went down due to TCP persist timer
expired.
fcipPortSrcAdminDown FCIP port went down because the source ethernet
link was administratively shutdown.
fcipPortSrcLinkDown FCIP port went down due to ethernet link down.
fcipSrcModuleNotOnline FCIP port went down due to source module not
online.
fcipSrcPortRemoved FCIP port went down due to source port removal.
fcotChksumErr FSP SPROM checksum error.
fcotNotPresent SFP (GBIC) not present.
fcotVendorNotSupported FSP (GBIC) vendor is not supported.
fcspAuthenfailure Fibre Channel security protocol authorization
failed.
ficonBeingEnabled FICON is being enabled.
ficonNoPortnumber No FICON port number.
ficonNotEnabled FICON not enabled.
ficonVsanDown FICON VSAN is down.
firstPortNotUp In a over subscribed line card, first port cannot be
brought up in E mode when the other ports in the
group are up.
firstPortUpAsEport In a over subscribed line card, when the first port
in a group is up in E mode, other ports in that
group cannot be brought up.
hwFailure Hardware failure.
incomAdminRxBBCreditPerBuf Disabled due to incompatible admin port
rxbbcredit, performance buffers.
incompatibleAdminMode Port admin mode is incompatible with port
capabilities.
incompatibleAdminRxBBCredit Receive BB credit is incompatible.
incompatibleAdminRxBufferSize Receive buffer size is incompatible.
incompatibleadminSpeed Port speed is incompatible with port capabilities.
initializing The port is being initialized.
interfaceRemoved Interface is being removed.
invalidAttachment Invalid attachment.
invalidConfig This port has a misconfiguration with respect to
port channels.
invalidFabricBindExh Invalid fabric binding exchange.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tooltip Definition
linkFailCreditLoss Link failure due to excessive credit loss
indications.
linkFailCreditLossB2B Link failure when link reset (LR) operation fails
due to queue not empty.
linkFailDebounceTimeout Link failure due to re-negotiation failed.
linkFailLineCardPortShutdown Link failure due to port shutdown.
linkFailLinkReset Link failure due to link reset.
linkFailLIPF8Rcvd Link failure due to F8 LIP received.
linkFailLIPRcvdB2B Link failure when loop initialization (LIP)
operation fails due to non empty receive queue.
linkFailLossOfSignal Link failure due to loss of signal.
linkFailLossOfSync Link failure due to loss of sync.
linkFailLRRcvdB2B Link failure when link reset (LR) operation fails
due to non-empty receive queue.
linkFailNOSRcvd Link failure due to non-operational sequences
received.
linkFailOLSRcvd Link failure due to offline sequences received.
linkFailOPNyRETB2B Link failure due to open primitive signal returned
while receive queue not empty.
linkFailOPNyTMOB2B Link failure due to open primitive signal timeout
while receive queue not empty.
linkFailPortInitFail Link failure due to port initialization failure.
linkFailPortUnusable Link failure due to port unusable.
linkFailRxQOverFlow Link failure due to receive queue overflow.
linkFailTooManyINTR Link failure due to excessive port interrupts.
linkFailure Physical link failure.
loopbackDiagFailure Loopback diagnostics failure.
loopbackIsolation Port is connected to another port in the same
switch.
noCommonVsanIsolation Trunk is isolated because there are no common
vsans with peer.
none No failure.
nonParticipating During loop initialization, the port is not allowed
to participate in loop operations
offline Physical link is in offline state as defined in the
FC-FS standards.
ohmsExtLBTest Link suspended due to external loopback
diagnostics failure.
other Undefined reason.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Tooltip Definition
parentDown The physical port to which this interface is bound
is down.
peerFCIPPortClosedConnection Port went down because peer FCIP port closed
TCP connection.
peerFCIPPortResetConnection Port went down because the TCP connection was
reset by the peer FCIP port.
portBindFailure Port got isolated due to port bind failure.
portBlocked Port blocked due to FICON.
portChannelMembersDown No operational members.
portFabricBindFailure Port isolated due to fabric bind failure.
portGracefulShutdown Port shutdown gracefully.
portVsanMismatchIsolation An attempt is made to connect two switches using
non-trunking ports having different port VSANs.
rcfInProgres An isolated xE_port is transmitting a reconfigure
fabric, requesting a disruptive reconfiguration in
an attempt to build a single, non-isolated fabric.
Only the Interconnect_Ports can become isolated.
srcPortNotBound No source port is specified for this interface.
suspendedByMode Port that belongs to a port channel is suspended
due to incompatible operational mode.
suspendedBySpeed Port that belongs to a port channel is suspended
due to incompatible operational speed.
suspendedByWWN Port that belongs to a port channel is suspended
due to incompatible remote switch WWN.
swFailure Software failure.
tooManyInvalidFLOGIs Suspended due to too many invalid FLOGIs.
tovMismatch Link isolation due to TOV mismatch
trunkNotFullyActive Some of the VSANs which are common with the
peer are not up.
upgradeInProgress Line card upgrade in progress.
vsanInactive Port VSAN is inactive. The port becomes
operational again when the port VSAN is active.
vsanMismatchIsolation This VSAN is not configured on both sides of a
trunk port.
zoneMergeFailureIsolation The two Interconnect_Ports cannot merge zoning
configuration after having exchanged merging
request for zoning.
zoneRemoteNoRespIsolation Isolation due to remote zone server not
responding.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
How do I preserve historical data when moving Fabric Manager server to new
host?
To preserve your data when moving Fabric Manager Server to a new host, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Open the server.properties file in the Fabric Manager installation directory. On a Windows platform, this
file is in C:\Program Files\Cisco Systems\MDS 9000 by default.
Step 2 Comment out the line: snmp.localaddress.
Step 3 Save and exit the file.
Step 4 Restart Fabric Manager.
Note There are some cases where you would not want to do this, and should manually select the interface that
Fabric Manager uses. For more information, see theHow do I run Cisco Fabric Manager with multiple
interfaces? section on page 67-20.
Step 1 Go to the MDS 9000 folder. On a Windows platform, this folder is at C:\Program Files\Cisco
Systems\MDS 9000 by default.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Go to the MDS 9000/bin folder. On a Windows platform, this folder is at C:\Program Files\Cisco
Systems\MDS 9000 by default.
Step 2 Edit the DeviceManager.bat file or the FabricManager.bat file.
Step 3 Scroll to the line that begins with set JVMARGS=
Step 4 Add the parameter -Device Managerds.nmsaddress=ADDRESS, where ADDRESS is the IP address or
interface name of the NIC you want to use.
Step 5 Save the file and relaunch Fabric Manager Client or Device Manager.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Caution Any devices not currently accessible (may be offline) are purged.
How do I fix a "corrupted jar file" error when launching Fabric Manager?
If you get the following error:
An error occurred while launching the application Fabric Manager.
The error message you are getting indicates that the Java Web Start cache is corrupted. You can try
clearing your Java Web Start cache first. To clear the Cache either run Java Web Start (from the Programs
menu) and under the preferences select clear cache. Or do it manually by first making sure all Fabric
Manager or Device Manager instances are closed and then deleting .javaws/cache. In the newer JREs this
directory is created under Documents and Settings\USERNAME and in the older ones it used to be under
Program Files\Java Web Start.
You can also browse beneath the cache folder and delete the offending IPAddress folder (e.g.
cache/http/D10.0.0.1).
Also, check to make sure that the host is not running a virus checker / java blocker?
You also can run the uninstall program and delete .cisco_mds directory, and then reinstall Fabric
Manager.
Step 1 Right-click the map and choose Find Elements from the drop-down menu.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
You see the Find Fabric dialog box as shown in Figure 67-1.
Step 2 Choose End Device from the left drop-down list.
Step 3 Choose Port WWN from the right drop-down list.
You can also enter only part of the WWN and use a wildcard (*) character (for example, you can enter
*fb*f8).
Figure 67-1 Find Fabric Dialog Box with End Device and Port WWN Selected
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To clear the license violation message and the orange X, stop the Cisco Fabric Manager service on the
host, and restart it again.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 68
Monitoring System Processes and Logs
This chapter provides details on monitoring the health of the switch. It includes the following sections:
Displaying System Processes, page 68-1
Displaying System Status, page 68-2
Core and Log Files, page 68-3
Online System Health Management, page 68-5
Default Settings, page 68-7
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Where:
ProcessId = Process ID
Name = Name of the process
MemAllocated = Sum of all the dynamically allocated memory that this process has received from
the system, including memory that may have been returned
CPU Time (ms) = CPU time the process has used, in microseconds
Step 2 Click Close to close the dialog box.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Module-num shows the slot number on which the core was generated. In this example, the fspf core was
generated on the active supervisor module (slot 5), fcc was generated on the standby supervisor module
(slot 6), and acltcam and fib were generated on the switching module (slot 8).
Step 2 Click Close to close the dialog box.
To clear the cores on a switch using Device Manager, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
To display the core files saved in the system, use the show cores command:
For example, there are five radius core files from vdc2 on the active supervisor module. The second and
third oldest files get deleted to comply with the number of core files defined in the service.conf file.
switch# show cores vdc vdc2
Note For information on most Online Health Management System procedures, refer to the Cisco MDS 9000
Family CLI Configuration Guide.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 68-1 lists the default system health and log settings.
Parameters Default
Kernel core generation One module.
System health Enabled.
Loopback frequency 5 seconds.
Failure action Enabled.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
CH A P T E R 69
Fabric Manager Web Services
This chapter describes the Fabric Manager Web Services (FMWS) application program interface (API).
This chapter includes the following sections:
About Fabric Manager Web Services, page 69-1
Web Services Specifications, page 69-1
Logon Service, page 69-2
San Service, page 69-4
Service Endpoint Interface (SEI), page 69-4
Methods, page 69-4
Error Codes, page 69-15
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
XML
XML is the data format that defines the structure of the message. XML Web Services architecture allows
programs written in different languages on different platforms to communicate with each other in a
standards-based way. XML Web Services expose useful functionality to Web users through a standard
Web protocol (SOAP).
SOAP
Simple Object Access Protocol (SOAP) is the communications protocol for Web Services. SOAP is a
specification that defines the XML format for messages. The advantage of SOAP is that it has been
implemented on many different hardware and software platforms.
HTTP/HTTPS
HTTP/HTTPS is the transport layer of the service. HTTP/HTTPS allows data to traverse the network
easily and is widely accepted. It is also considered as platform neutral. Every Fabric Manager Web
Services operation is through HTTP/HTTPS.
WDSL
A WSDL definition is an XML document with a root definition element from the
http://schemas.xmlsoap.org/wsdl/ namespace. Fabric Manager Web Services uses the WSDL document
to publish which operations of Fabric Manager are available. The definitions element may contain
several other elements including types, message, portType, binding, and service, all of which come from
the namespace. WSDL is published on FMServer at http://localhost/LogonWSService/LogonWS?wsdl
Logon Service
LogonWS makes IdentityManagers operations available as Web Service calls. LogonWS allows the
following operations:
requestToken
This method returns a token string that must be passed in as the header of the SOAP message. Once the
username and password is authentication using Fabric Managers SecurityManager, the token is
generated and is kept valid for the number of milliseconds specified in the expiration argument.
Parameters
usernameName of the user.
passwordPassword of the user.
expirationTime (in milliseconds).
Return Value
Session token.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Error
Error code: 201Invalid argument in Web Service exception.
validateToken
This method returns true or false depending on the validity of the token. If the token has expired, it
returns false, or else it returns true.
Parameters
tokenSession Token.
Return Value
Boolean value True if the Fabric Manager accepts the token.
Error
Error code: 201Invalid argument in Web Service exception.
Authentication or Token
To interact with Fabric Manager Web Services, the user must obtain a token through LogonWS and
attach this token to the header message of every SOAP requests. Fabric Manager Web Services verifies
user credentials using a unique token string that is administered by LogonWS. At any given time,
HTTPS should be deployed to secure the communication channel. The following example displays the
format of the header message:
<?xml version="1.0" encoding="UTF-8"?>
<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<SOAP-ENV:Header xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" >
<m:Token xmlns:m="http://www.w3schools.com/transaction/">
token string is put here
</m:Token></SOAP-ENV:Header>
<SOAP-ENV:Body>
<getFabrics xmlns="http://ep.jaxws.dcbu.cisco.com/"/>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>
IdentityManager
IdentityManager provide identity services and manage the user credentials that are required by Web
Services. It is the token provider who administers and maintains tokens. It authenticates the user,
generates tokens, and validates or expires tokens by periodically checking and clearing the cache.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
San Service
San Service is an Enterprise Java Beans (EJB) component that manages SAN-related service requests
and executes queries on Fabric Manager for information. SanWS checks with IdentityManager for
authentication before performing the request. A valid token string tells San Service that the user is a
Fabric Manager user and it must honor and execute the request. After retrieving the required information
it sends the result back to the user. SanWS logs errors in fms_ws.log.
Methods
getFabrics
Returns the list of all open fabrics.
Return Value
An array of open fabrics.
Error
Error Code: 300 General SAN Service exception.
getFabricByIP
Returns the list of fabrics associated with the IP address of a given switch.
Parameters
ipAddressIP address of the switch.
Return Value
List of all fabrics associated with the specificIP address.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getFabricByKey
Returns the list of fabrics associated with the specified key.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Parameters
keyKey of the fabric.
Return Value
List of all fabrics associated with the specified key.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getFabricBySwitchKey
Returns the list of fabrics associated with the specified seed switch key (WWN).
Parameters
swkeySeed switch key of the fabric.
Return Value
List of all fabrics associated with the specified seed switch key.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getSwitchesByFabric
Returns the list of switches associated with the specified fabric key.
Parameters
keyKey of the fabric.
Return Value
List of all fabrics associated with the specified fabric key.
Error
Error Code: 300 General SAN Service exception.
getSwitch
Returns the list of switches on all the fabrics.
Parameters
keyKey of the fabric.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Return Value
List of all fabrics associated with the specified fabric key.
Error
Error Code: 300 General SAN Service exception.
getSwitchByKey
Returns the switch associated with the specified switch key object.
Parameters
keyKey of the fabric.
Return Value
Switch associated with the specified switch key.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getSwitchIPByName
Returns the IP address associated with the specified system name or switch name.
Parameters
sysnameName of the system or switch.
Return Value
IP address associated with the specified system name.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getSwitchIPByKey
Returns the IP address of the switch associated with the specified WwnKey object.
Parameters
keyWWN Key object.
Return Value
IP address associated with the specifiedWwnKey object.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getNeighborSwitches
Returns the list of neighboring switches associated with the specified WwnKey.
Parameters
keyWwn Key object.
Return Value
List of neighboring switches associated with the specifiedWwnKey.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
Error code: 302SAN does not found objects by query key exception.
getVsans
Returns the list of VSANs in the fabric associated with the specified fabric key.
Parameters
keyfabric key object.
Return Value
List of VSANs in the fabric associated with the specified fabric key.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getVsan
Returns the VSAN in the fabric associated with the specified VSAN key object.
Parameters
keyVSAN key object.
Return Value
VSANs in the fabric associated with the specified VSAN key object.
Error
Error Code: 300 General SAN Service exception.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
getIsls
Returns the list of ISLs in the VSAN associated with the specified VSAN key.
Parameters
keyVSAN key.
Return Value
Array of ISL objects in the VSAN associated with the specified VSAN key.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
discoverFabric
This API will open the fabric. This function requires the IP address of the seed switch and SNMP
credentials.
Parameters
seedIP address of the seed switch.
userSNMP Credential.
Return Value
Boolean value is True, if the discovery was successful.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
Error Code: 100 Authentication failure exception.
Error code: 101Invalid credentials exception.
manageFabric
Returns true or false depending managability of the fabric.
Parameters
keyFabric key.
Return Value
Returns true if the fabric can be identified ot managed. Returns false if the fabric cannot be identified ot
managed.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
unManageFabric
This function is used to unmanage a fabric.
Parameters
keyFabric key.
Return Value
None.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
closeFabric
This functions is used to un manage and close a fabric.
Parameters
keyFabric key.
Return Value
None.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
purgeFabric
This functions is used to purge the specified fabric data both from Fabric Manager cache and database.
Parameters
keyFabric key.
Return Value
None.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Error code: 302SAN does not found objects by query key exception.
getEndports
Returns the list of all the end ports known to the Fabric Manager.
Return Value
An array of all the end ports.
Error
Error Code: 300 General SAN Service exception.
getEnclosures
Returns the list of all the enclosures known to the Fabric Manager.
Return Value
An array of enclosure objects.
Error
Error Code: 300 General SAN Service exception.
getEndPortByFWwn
Returns the end port based on FPort WWN.
Parameters
wwnWWN of the FPort.
Return Value
Returns an array of end port based on FPort WWN. Returns null if there are no end ports associated with
the FPort.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getEndPortByKey
Returns the end port based on Switch WWN.
Parameters
keyWWN of the node.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Return Value
Returns the end port based on Switch WWN. Returns null if there are no end ports associated with the
Switch.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getEndPortAttachedToSw
Returns the end ports that are associated with a switch.
Parameters
keyIP address of the switch.
Return Value
Returns the end ports based on switch.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getEnclosureByName
Returns the enclosure based on the name.
Parameters
nameName of the enclosure object.
Return Value
Returns the enclosure object..
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getEnclosureByKey
Returns the enclosure based on the name.
Parameters
nameName of the enclosure object.
Return Value
Returns the enclosure object.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Error
Error Code: 300 General SAN Service exception .
Error code: 201Invalid argument in Web Service exception.
getEnclosureByPWwn
Returns the enclosure that are associated with a physical WWN.
Parameters
wwnPhysical WWN of the switch.
Return Value
Returns the enclosure based on physical WWN.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
updateEnclosure
Update the enclosure with the value that is passed as parameter.
Parameters
valueValue to update the enclosure.
Return Value
None.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
updateEndportEnclosure
Update the end port enclosure with the value that is passed as parameter.
Parameters
endportKeyValue for the endportKey.
enclosureKeyValue for the enclosureKey.
Return Value
None.
Error
Error Code: 300 General SAN Service exception.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
getHosts
Returns the list of all the host enclosures known to Fabric Manager.
Return Value
Returns the list of all the host enclosures known to Fabric Manager.
Error
Error Code: 300 General SAN Service exception.
getHost
Returns the name of hosts in a VSAN.
Parameters
keyName of the VSAN.
Return Value
Returns the name of the hosts in tthe specified VSAN.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getHostByFabric
Returns the name of hosts in a fabric.
ValidationException is thrown if any of the following situation occurs:
If the argument passed is null.
If the argument does not contain a valid key.
Parameters
keyName of the fabric.
Return Value
Returns the name of the hosts in the specified VSAN.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
getStorages
Returns the list of all the storage device enclosures known to Fabric Manager.
Return Value
An array of all the storage device enclosures known to Fabric Manager.
Error
Error Code: 300 General SAN Service exception.
getStorageByFabric
Returns the name of storage device enclosures in a fabric.
Parameters
keyName of the fabric.
Return Value
Returns the name of the storages in the specified fabric.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
getHostPorts
Returns the list of all the host end ports in a fabric.
Parameters
keyName of the fabric.
Return Value
An array of all the host ports in a fabric.
Error
Error Code: 300 General SAN Service exception.
Error code: 201Invalid argument in Web Service exception.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Error Codes
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
A P P E N D I X A
Launching Fabric Manager in Cisco SAN-OS
Releases Prior to 3.2(1)
This appendix provides instructions for launching Fabric Manager Client in Cisco SAN-OS releases
prior to 3.2(1).
This Appendix contains the following sections:
Setting the Seed Switch in Cisco SAN-OS Releases 3.1(1) to 3.2(1), page A-1
Setting the Seed Switch in Releases Prior to Cisco SAN-OS Release 3.1(1), page A-3
From Cisco SAN-OS Release 3.1(1) to Release 3.2(1), you must log in to Fabric Manager Server before
you discover or open fabrics, and these fabrics can have different user credentials. You can specify
different SNMP communities per switch on the Web Server.
Note The default user name is admin and the default password is password for your initial login. This
information is stored in the database. Both the Fabric Manager Server and the Web Server share the same
user credential database.
To log in to Fabric Manager Server and to open a fabric, follow these steps:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 2 Set FM Server to the IP address where you installed Fabric Manager Server, or set it to localhost if you
installed Fabric Manager Server on your local workstation.
If you forget your password, you can run one of the following scripts:
bin\webUserAdd.bat admin password adds a user name and password to the Fabric Manager
Server database.
bin\DBReset.bat resets the database back to the initial state and removes any discovered
fabrics.
Both of these scripts are available as UNIX .sh files.
Step 3 Enter the Fabric Manager Server user name and password.
Step 4 Check the Use SNMP Proxy check box if you want Fabric Manager Client to communicate with Fabric
Manager Server through a TCP-based proxy server.
Step 5 Click Login. After you successfully log in to Fabric Manager Server, you can set the seed switch and
open the fabrics that you are entitled to access.
You see the Discover New Fabric dialog box shown in Figure A-2.
Step 6 Set the fabric seed switch to the Cisco MDS 9000 Family switch that you want Fabric Manager to use.
Step 7 Enter the user name and password for the switch.
Step 8 Choose the Auth-Privacy option MD5-DES (default) when you log in.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note The Accelerate Discovery check box should remain checked for normal operation. Uncheck this
only if you have changed switch IP addresses. You may experience problems with SAN IDs in
Fabric Manager if you uncheck this check box.
Step 10 Check the check box(es) next to the fabric(s) you want to open in the Select column, or click the
Discover button to add a new fabric.
Note As of Cisco SAN-OS Release 3.1(1) and later, opening multiple fabrics is a licensed feature. You
will get a message if any of the fabrics discovered does not have a license.
Note As of Cisco SAN-OS Release 3.1(2b), a license can be a permanent license, an evaluation
license, or there are no licenses (all evaluation licenses have expired).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
When you run Fabric Manager, you must select a switch for Fabric Manager to use to discover the fabric.
For releases earlier than Cisco SAN-OS Release 3.1(1), use the same user name and password on each
of the multiple fabrics that you open, then log in directly to the MDS 9000 Family switch that you want
Fabric Manager to use.
To set the seed switch if you are running a version of Cisco SAN-OS that is earlier than Cisco SAN-OS
Release 3.1(1), follow these steps:
Step 2 Click the Options button if necessary to expand the optional settings in this dialog box.
Step 3 Set FM Server to the IP address where you installed Fabric Manager Server, or set it to localhost if you
installed Fabric Manager Server on your local workstation.
Step 4 Set the fabric seed switch to the MDS 9000 Family switch that you want Fabric Manager to use.
Step 5 Enter the user name and password for the switch.
Step 6 Check the Use SNMP Proxy check box if you want Fabric Manager Client to communicate with Fabric
Manager Server through a TCP-based proxy server.
Note The Accelerate Discovery check box should remain checked for normal operation. Uncheck this
only if you have changed switch IP addresses. You may experience problems with out of sync
SAN IDs in Fabric Manager if you uncheck this check box.
A P P E N D I X B
Cisco Fabric Manager Unsupported Feature List
This appendix contains a list of features and functions not supported by Cisco Fabric Manager or Device
Manager. This list is organized according to the chapter in which the feature would be described if it
were supported. (See Table B-1.) For documentation about these features, refer to the Cisco MDS 9000
Family CLI Configuration Guide.
Table B-1 Features Not Supported by Cisco Fabric Manager or Device Manage
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table B-1 Features Not Supported by Cisco Fabric Manager or Device Manage (continued)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Table B-1 Features Not Supported by Cisco Fabric Manager or Device Manage (continued)
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
A P P E N D I X C
Interface Nonoperational Reason Codes
If the administrative state for an interface is up and the operational state is down, the reason code differs
based on the nonoperational reason code as described in Table C-1.
Applicable
Reason Code Description Modes
Link failure or not connected Physical layer link is not operational. All
SFP not present The small form-factor pluggable (SFP) hardware is not
plugged in.
Initializing The physical layer link is operational and the protocol
initialization is in progress.
Reconfigure fabric in progress The fabric is currently being reconfigured.
Offline Cisco MDS SAN-OS waits for the specified R_A_TOV
time before retrying initialization.
Inactive The interface VSAN is deleted or is in a suspended
state.
To make the interface operational, assign that port to a
configured and active VSAN.
Hardware failure A hardware failure is detected.
Error disabled Error conditions require administrative attention.
Interfaces may be error-disabled for various reasons.
For example:
Configuration failure.
Incompatible buffer-to-buffer credit configuration.
To make the interface operational, you must first fix the
error conditions causing this state; and next,
administratively shut down or enable the interface.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Applicable
Reason Code Description Modes
Isolation due to ELP failure Port negotiation failed. Only E ports
Isolation due to ESC failure Port negotiation failed. and TE ports
A P P E N D I X D
Managing Cisco FabricWare
The Cisco FabricWare software running on the MDS 9020 Switch offers Fibre Channel switching
services that realize maximum performance. Cisco FabricWare provides networking features such as
zoning, advanced security, nondisruptive software upgrades, diagnostics, a CLI with syntax resembling
Cisco IOS, and standard interfaces for management applications.
This appendix contains the following sections:
Fibre Channel Support, page D-1
Zone Configuration, page D-2
Security, page D-2
Events, page D-2
Managing Cisco FabricWare with Fabric Manager, page D-3
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Zone Configuration
Zoning enables you to set up access control between storage devices or user groups. If you have
administrator privileges in your fabric, you can create zones to increase network security and to prevent
data loss or corruption. Zoning is enforced by examining the source-destination ID field. Cisco
FabricWare does not support QoS, broadcast, LUN, or read-only zones.
You can use the Fabric Manager zone configuration tool to manage zone sets, zones, and zone
membership for switches running Cisco FabricWare. Cisco FabricWare supports zone membership by
pWWN. See the Configuring a Zone Using the Zone Configuration Tool section on page 30-12.
Security
Cisco FabricWare supports the following security features:
RADIUS
SSH
User-based roles
IP access control lists
Cisco FabricWare can use the RADIUS protocol to communicate with remote AAA servers. RADIUS is
a distributed client/server protocol that secures networks against unauthorized access. In the Cisco
implementation, RADIUS clients run on Cisco MDS 9000 Family switches and send authentication
requests to a central RADIUS server that contains all user authentication and network service access
information.
You can access the CLI using the console (serial connection), Telnet, or Secure Shell (SSH). For each
management path (console or Telnet and SSH), you can configure one or more of the following security
control options: local, remote (RADIUS), or none.
Using these access methods, you can configure the roles that each authenticated user receives when they
access the switch. Cisco FabricWare supports two fixed roles: network administrator and network
operator.
IP access lists (IP-ACLs) control management traffic over IP by regulating the traffic types that are
allowed or denied to the switch. IP-ACLs can only be configured for the mgmt0 port.
Fabric Manager Server uses SNMPv1 and SNMPv2 to communicate with Cisco FabricWare.
Events
You can monitor fabric and switch status for Cisco FabricWare switches through either a syslog server
or an SNMP trap receiver.
The syslog, or system message logging software, saves messages in a log file or directs the messages to
other devices. This feature provides you with the following capabilities:
Provides logging information for monitoring and troubleshooting
Allows you to select the types of captured logging information
Allows you to select the destination server to forward the captured logging information
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
By default, the switch logs normal but significant system messages to a log file and sends these messages
to the system console. You can specify which system messages should be saved based on the type of
facility and the severity level. You can access logged system messages using the CLI or by saving them
to a properly configured system message logging server.
You can configure the Cisco MDS 9020 Switch using the CLI to send notifications to SNMP managers
when particular events occur. You can send these notifications as traps.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
INDEX
3DES encryption
Symbols
IKE 44-7
* (asterisk) IPsec 44-6
autolearned entries 46-20 4/44-port 8-Gbps switching modules
port security wildcard 46-15 default settings 22-43
port security wildcards 46-15 example configurations 22-16
48-port 4-Gbps switching modules
bandwidth fairness 22-37
Numerics
configuration guidelines 22-30
12-port 4-Gbps switching modules default settings 22-43
BB_credit buffers 22-20 example configurations 22-17
configuration guidelines 22-31 oversubscription 22-34
default settings 22-43 shared resources 22-10
See also switching modules See also switching modules
16-port switching modules 48-port 8-Gbps switching modules
configuring BB_credits 20-26 default settings 22-43
LEDs 20-19 example configurations 22-14
See also switching modules See also switching modules
24-port 4-Gbps switching modules 4-port 10-Gbps switching modules
bandwidth fairness 22-37 BB_credit buffers 22-21
configuration guidelines 22-30 configuration guidelines 22-31
default settings 22-43 default settings 22-43
example configurations 22-19 See also switching modules
oversubscription 22-34
shared resources 22-10
A
See also switching modules
24-port 8-Gbps switching modules AAA
default settings 22-43 authentication process 41-6
example configurations 22-15 authorization process 41-6
32-port switching modules configuring information 7-53
configuring BB_credits 20-26 default settings 41-30
SPAN guidelines 60-6 description 41-1
See also switching modules DHCHAP authentication 45-10
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
iSCSI 50-26
configuring 29-11, 29-12
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
description 44-13
I
images
IBM PPRC See kickstart images; software images; system images
FICON support 36-5 Software Installation Wizard 15-8
ICMP images. See kickstart images; software images; system
IPv6 54-6 images
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
J L
Java latency
execution failures 67-6 forwarding 50-33
java.lang.ArrayIndexOutOfBoundsException LEDs
errorArrayIndexOutOfBoundsException error 67-7
beacon mode states 20-19
Java RMI
speed 20-19
ports used 2-41
license key files
Java Runtime Environment. See JRE
description 10-2
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
factory-installed 10-9
linkFailCreditLoss tooltip 67-17
feature-based 10-3
linkFailDebounceTimeout tooltip 67-17
terminology 10-1
Link Incident Records. See LIRs
uninstalling 10-14
description 54-4
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
deactivating 46-9
default settings 65-6
disabling 46-8
guidelines 65-2
enabling 46-8
shutting down ports forcefully 65-6
cleaning up 46-23
Device Manager 6-8
copying 46-22
Export Tables with Format default 5-31
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
users with multiple roles (procedure) 40-6 restricting switch access 40-3
user synchronization with CLI 40-3 security features 40-2
Version 3 security features 40-1, 40-2 specifying cisco-av-pair 41-13
versions supported 40-1 support 2-16
viewing event log 40-12 See also SNMP 40-2
See also SNMPv1; SNMPv2c; SNMPv3 software configuration
SNMP_TRAP overview 1-6 to 1-8
port used 2-41 software images
SNMP community strings default settings 15-17
configuring 2-10 selecting for supervisor modules 15-2
SNMP manager space requirements 15-4
FCS 63-2 synchronizing 17-4
SNMP preferences upgrade prerequisites 15-3 to 15-5
Enable Audible Alert when Event Received upgrading SAN-OS images 15-1
default 5-31
variables 15-1
Retry request 1 time(s) after 5 sec timeout software installation
default 5-31
Software Installation Wizard 15-8
Trace SNMP packets in Log default 5-31
software upgrades
SNMPv1
disruptive 15-5
community strings 40-2
mechanisms 15-5
description 40-2
nondisruptive 17-1
FabricWare support D-2
Software Installation Wizard 15-8
support 2-16
soft zoning
See also SNMP
description 30-26
SNMPv2
See also zoning
community strings 40-2
Solaris 2-34
FabricWare support D-2
Fabric Manager Server 3-1
SNMPv2c
installing Fabric Manager Web Services 7-4
configuring notifications 40-8
install scripts 2-34
description 40-2
source IDs
support 2-16
Call Home event format 62-34
See also SNMP
exchange based 23-5
SNMPv3
flow based 23-4
assigning multiple roles 40-6
in-order delivery 32-15
CLI user managementSNMPv3
path selection 26-11
AAA integration 40-2
SPAN
configuring notifications 40-9
configuration guidelines 60-6
description 40-2
configuring 60-6 to 60-10
enforcing message encryption 40-5
configuring Fibre Channel analyzers 60-11
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m