Configuring the Fibre Channel Gateway

Size: px
Start display at page:

Download "Configuring the Fibre Channel Gateway"

Transcription

1 CHAPTER 6 This chapter describes Fibre Channel gateway configuration and includes the following sections: Before You Begin, page 6-1 Administering the Fibre Channel Gateway, page 6-1 Pre-configuration Checklist, page 6-2 Configuring a New Fibre Channel Gateway, page 6-2 Updating Existing Configurations, page 6-2 Bringing Up a Fibre Channel Gateway Module, page 6-3 Configuring Global Policies, page 6-5 Configuring Port Parameters, page 6-7 Configuring Initiators, ITs, and ITLs, page 6-15 Before You Begin If the gateway ports connect to a Fibre Channel switch, the corresponding Fibre Channel switch port needs to be configured as an E port. See the FC-switch specific documentation to obtain the set of appropriate commands to perform this configuration. If the gateway port connects directly to a storage device, then the storage port needs to act as an F port, which is usually the default behavior. See the storage-specific documentation to configure the storage port as an F port. Administering the Fibre Channel Gateway Use the CLI to administer your Fibre Channel gateway modules. See the Cisco SFS Product Family Command Reference. 6-1

2 Pre-configuration Checklist Chapter 6 Pre-configuration Checklist Before you can connect a Cisco Fibre Channel gateway port to a fabric, verify that the following tasks have been completed: The Fibre Channel gateway module is up. (See the Bringing Up a Fibre Channel Gateway Module section on page 6-3.) The Fibre Channel gateway port is up. (See the Bringing Up a Fibre Channel Port section on page 6-14.) You have set up the correct interop mode for the port. (See the About Interop Modes section on page 6-7.) You have set up the correct the domain ID for the port. (See the Setting Domain ID section on page 6-9.) You have set up the correct the port speed. (See the Setting the Port Speed section on page 6-10.) Configuring a New Fibre Channel Gateway After you install a new Fibre Channel gateway (see the Cisco SFS 3504 Multifabric Server Switch Hardware Installation Guide for more information), perform the following steps: Bring up your gateway (see the Bringing Up a Fibre Channel Gateway Module section on page 6-3) so that it can pass traffic. Configure global SRP/ITL attributes to assign default attributes to new ITLs. (See the Configuring Initiators, ITs, and ITLs section on page 6-15 for information about how to perform this step and the following steps in this section.) Discover ITLs (see the Configuring ITLs section) to provide communication paths between hosts and storage. Customize ITLs and ITs (see the Configuring Individual ITL Attributes section) to grant or deny storage access beyond defaults and to configure custom behavior beyond defaults. Updating Existing Configurations To make changes to existing Fibre Channel gateway configurations, perform any one of the following tasks in this section. (See the Configuring Initiators, ITs, and ITLs section on page 6-15 for information about how to perform the tasks in this section.) Reconfigure global ITL attributes (see the Configuring Individual ITL Attributes section) to change the default configuration of new ITLs. Note Remember that when you change global defaults, existing ITLs that you created with the original defaults do not change. You must reconfigure existing ITLs individually. Reconfigure existing ITLs (see the Configuring Individual ITL Attributes section) to update access and behavior as your SAN priorities and requirements change. 6-2

3 Chapter 6 Bringing Up a Fibre Channel Gateway Module Add additional ITLs (see the Configuring ITLs section) as you add storage devices and hosts. Bringing Up a Fibre Channel Gateway Module Bring up interface cards to run traffic between IB hosts and Fibre Channel storage. To bring up a Fibre Channel gateway module, perform the following steps: Open a CLI session, and log in as a user with Fibre Channel read-write access privileges. (For more information about privilege levels and access levels, see Table 2-1 on page 2-2, Privilege Levels, and Table 2-2 on page 2-2, Access Levels. ) Login: super Password: xxxxx Enter the enable command to enter Privileged EXEC mode: Enter the show card command to verify that your module booted successfully. Note Do not proceed until the boot stage field displays done and the boot status field displays success. show card Card Information admin oper admin oper oper slot type type status status code fc4port4g fc4port4g up up normal 2 fc4port4g fc4port4g up up normal 3 en6port1g3500 en6port1g3500 up up normal 4 en6port1g3500 en6port1g3500 up up normal 5* controllerib12port4xddr controllerib12port4xddr up up normal Card Boot Information boot boot boot slot stage status image done success image-a:sfs_os /build626 2 done success image-a:sfs_os /build626 3 done success image-a:sfs_os /build626 4 done success image-a:sfs_os /build626 5 done success image-a:sfs_os /build626 Card Seeprom product pca pca fru slot serial-number serial-number number number 6-3

4 Bringing Up a Fibre Channel Gateway Module Chapter JAB111501C5 JAB111501C JAB111501BF JAB111501BF JAB B JAB B JAB JAB JAB111902Z1 JAB111902Z Step 5 Enter global configuration mode. Enter the card command and the slot number in which your Fibre Channel gateway resides. card 2 SFS-3504(config-card-2)# Note On the Cisco SFS 3504 Series Switch, gateways can be inserted and configured in slots 1-4 only. Step 6 Enter the no shutdown command to bring up the card. SFS-3504(config-card-2)# no shutdown SFS-3504(config-card-2)# Bringing Down a Fibre Channel Module To bring down a module, follow these steps: Step 5 Open a CLI session, and log in as a user with Fibre Channel read-write privileges. (For more information about privilege levels and access levels, see Table 2-1 on page 2-2, Privilege Levels, and Table 2-2 on page 2-2, Access Levels. ) Login: super Password: xxxxx Enter privileged EXEC mode: Identify the module to be shut down: card 2 Shut down the module. SFS-3504(config-card-2)# shutdown 6-4

5 Chapter 6 Configuring Global Policies Configuring Global Policies When you configure global policies, you create a series of default characteristics for random access devices (disks) and sequential access devices (tape). These characteristics automatically apply to all initiators, ITs, and ITLs that you add thereafter. The global policies that you configure automatically apply to every ITL series that you create after that. If you make changes to the global policies on your device, those changes do not propagate to your existing ITLs; they only apply to the new ITLs as you create them. Note Configure global policies before you configure individual initiators, ITs, and ITLs. When you add initiators, ITs, and ITLs, you can customize them on an individual basis. For example, use global policies to deny all LUN access to all new initiators, and then grant each initiator access to only the LUNs that you want them to access. Configuring Port Mask Policy Initiator access to a gateway port can be restricted or allowed. By default, the policy is restricted. If access is set to restricted, you must manually configure the port mask to allow access to the gateway port. To manually configure the port mask, perform the following steps: Configure the port mask by entering the no fc srp-global gateway-portmask-policy restricted command. Configuring ITL Policies You can choose between configuring load-balancing or failover when configuring ITL policies. You cannot use both or neither one. To configure ITL policies, perform the following steps: Enter global configuration mode. Configure load balancing to specify if SRP traffic should be load-balanced across Fibre Channel ports: fc srp-global itl dynamic-gateway-port-loadbalancing 6-5

6 Configuring Global Policies Chapter 6 Step 5 Set the port failover. One active Fibre Channel port is used for SRP traffic. If the port goes down, then another active port takes over. fc srp-global itl dynamic-gateway-port-failover Set the number of times an SRP command should be retried on the Fibre Channel side: fc srp-global itl max-retry 10 Set the timeout value, in seconds, after which a command should be retried: fc srp-global itl min-io-timeout 120 Configuring the LUN Access Policy Initiator access to LUNs is restricted (default) or allowed. If the LUN access policy for any particular ITL (or for all ITLs) is restricted, any new initiator that gets created will inherit that policy. Consequently, this initiator is able to discover new LUNs (through the discover-itl process), but it is not able to connect to any of those LUNS. For the host to access any of the discovered LUNs, you must grant individual access to any of those discovered LUNs. If the LUN access policy is not restricted, any new initiator is able to discover LUNs and connect to any or all of them without user intervention. Administrative users can restrict individual host access to any individual LUN. To configure LUN access policy, perform the following steps: Enter global configuration mode. Enter the command to set the LU policy to restricted: fc srp-global lun-policy restricted Verifying Global Policies To verify global policies, perform the following steps: Enter privileged EXEC mode: Verify the configuration, as shown in the following example: show fc srp-global SRP Global Information default-gateway-portmask-policy : restricted 6-6

7 Chapter 6 Configuring Port Parameters default-lun-policy : restricted default-itl-hi-mark : 16 default-itl-max-retry : 5 default-itl-min-io-timeout : 10 default-itl-dynamic-path-affinity : false default-itl-dynamic-gateway-port-load-balancing : true default-itl-dynamic-gateway-port-failover : false default-seq-itl-hi-mark : 1 default-seq-itl-max-retry : 1 default-seq-itl-min-io-timeout : 60 default-seq-itl-dynamic-path-affinity : false default-seq-itl-dynamic-gateway-port-load-balancing : false default-seq-itl-dynamic-gateway-port-failover : true Configuring Port Parameters This section includes the following topics: About Interop Modes, page 6-7 Setting the Interop Mode, page 6-8 Setting Domain ID, page 6-9 Setting the Connection Type, page 6-9 Setting the Port Speed, page 6-10 Configuring the Trunk Mode, page 6-12 Displaying the Current Port Settings, page 6-12 Bringing Up a Fibre Channel Port, page 6-14 Shutting Down a Fibre Channel Port, page 6-14 About Interop Modes Interoperability is the facet of an implementation where multiple vendor products come in contact with each other. Fibre Channel standards have been put into place to guide vendors toward common external Fibre Channel interfaces. The gateway ports on the Cisco SFS 3504 Server Switch interoperate with Cisco MDS, Brocade, and McData switches and support the following interoperability modes: Default or Native Interop Mode 0 This mode is a port mode that defines the default port behavior, and it is recommended for a VSAN that is communicating with a SAN composed entirely of Cisco MDS 9000 switches. Interop Mode 1 This mode is the standard interoperability mode. It interoperates with Brocade McData, and Cisco MDS switches that have been configured for their own interoperability modes. Brocade, McData, and Cisco MDS switches must be running in interop mode for them to work with this port mode. Interop Mode 2 This mode, also known as legacy switch interop mode 2, allows seamless integration with specific Brocade switches with fewer than 16 ports that are running in their own native mode of operation. Brocade switches must be configured with core pid = 0 to work with this mode. 6-7

8 Configuring Port Parameters Chapter 6 Interop Mode 3 Similar to interop mode 2, interoperability mode 3 was introduced for Brocade switches that contained more than 16 ports. With this VSAN-based interop mode, Brocade switches do not need to be altered from their native mode (core pid = 1) and can be seamlessly added to a new or existing Cisco MDS SAN-OS VSAN. This mode is also known as legacy switch interop mode 3. Interop Mode 4 This mode, also known as legacy switch interop mode 4, provides seamless integration between the Cisco SFS 3504 Fibre Channel gateway and McData switches running in McData Fabric 1.0 interop mode. For more information about interop modes, see the Cisco MDS 9000 Family Switch-to-Switch Interoperability Configuration Guide. Setting the Interop Mode When setting the Interop mode, you must shut down the port first, set the mode, and then bring up the port again. For more information about interop modes, see the About Interop Modes section on page 6-7. To set the interop mode, perform the following steps: Step 5 Step 6 Step 7 Enter the interface for which you want to set the interop mode: (config)interface fc 2/1 SFS-3504(config-if-fc-2/1)# Shut down the port: (config-if-fc-2/1)# shutdown Determine which interop modes are available: (config-if-fc-2/1)# interop? Possible interop values: 0 Native mode 1 Brocade and McData in interop mode 2 Brocade with 16 or less ports in native mode 3 Brocade with more than 16 ports in native mode 4 McData in native mode Configure the interop mode. The following example shows how to configure Native mode: SFS-3504(config-if-fc-2/1)# interop 0 Bring up the port again: (config-if-fc-2/1)# no shutdown 6-8

9 Chapter 6 Configuring Port Parameters Setting Domain ID Domain IDs should be unique across the SAN. If you are connecting to the same fabric, all gateway ports on the same module can share the same domain ID. All active VSANS on the interface use the configured domain ID. Interop Mode 0 Domain ID values are 1 to 239. Interop Mode1 Domain ID values are 97 to 127 to accommodate the McData restriction in this same range. Interop Mode 2 Domain ID values are 1 to 239. Interop Mode 3 Domain ID values are 1 to 239. Interop Mode 4 Domain ID values are 97 to 127 to accommodate the McData restriction in this same range. Setting the domain ID is mandatory, and you must follow the steps in the recommended order. To set the domain ID, follow these steps: Step 5 Enter the interface for which you want to set the domain ID: interface fc 2/1 Shut down the port: (config-if-fc-2/1)# shutdown Set the domain ID: SFS-3504(config-if-fc-2/1)# domain <id> Bring up the port again: (config-if-fc-2/1)# no shutdown Setting the Connection Type For more information about connection types, see the Topologies section on page 5-4. To set the connection type, perform the following steps: Enter the interface for which you want to set the connection type: interface fc 2/1 6-9

10 Configuring Port Parameters Chapter 6 Shut down the port: (config-if-fc-2/1)# shutdown Set the connection type. Select from the following connection types: Force E Set this type when connecting to a Fibre Channel switch. Force F Set this type when connecting direct-attached storage. Force E or F Set this type to detect the connection type. Set the connection type to Force E with the following command: SFS-3504(config-if-fc-2/1)# connection-type force-e Set the connection type to Force F with the following command: SFS-3504(config-if-fc-2/1)# connection-type force-f Set the connection type to Force E or F with the following command: SFS-3504(config-if-fc-2/1)# connection-type auto-e-or-f Step 5 Bring up the port again: (config-if-fc-2/1)# no shutdown Setting the Port Speed You can set the port speed to 1 Gbps, 2 Gbps, or 4 Gbps on a Cisco SFS 3504 Server Switch. When you set the speed, you need to set the port speed value to 1000, 2000, or Note Using the auto-negotiate command overrides the speed setting. You must disable auto-negotiation with the no auto-negotiate command to set the port speed. To set the port speed, follow these steps: Enter the interface for which you want to set the port speed: interface fc 2/1 Set the port speed: SFS-3504(config-if-fc-2/1)# speed

11 Chapter 6 Configuring Port Parameters Setting the Port VSAN By default, all ports are assigned the VSAN ID of 1. To change a port VSAN, perform the following steps: Enter the interface that you want to assign to a VSAN: interface fc 2/1 Assign the port to the VSAN: SFS-3504(config-if-fc-2/1)# vsan 20 The following output shows the assigned port VSAN: Fibre Channel Interface Information port : 2/1 name : 2/1 type : fc4gfx desc : 2/1 (129) last-change : Tue Jun 30 18:29: fc-address : 00:00:00 gateway wwnn : 20:00:00:1b:0d:00:47:05 wwpn : 20:00:00:1b:0d:00:47:15 mtu : 2048 auto-negotiate-supported : yes auto-negotiate : enabled admin-status : up oper-status : up admin-speed : 4gbps oper-speed : 2gbps admin-connection-type : force-e oper-connection-type : E-port link-trap : enabled principle switch wwnn : 20:14:00:0d:ec:0e:fd:c1 port wwnn : 00:00:00:00:00:00:00:00 distributed svc timeout : 5000 error detect timeout : 2000 fabric stability timeout : 5000 receiver xmitter timeout : 100 resource allo timeout : check age : 5 hello dead interval : 80 hello interval : 20 link state ack interval : 5 link state refresh time : 30 max age : 60 admin domain id : 20 oper domain id : 20 interop mode : 0 connection error : 0 admin port vsan : 20 oper port vsan : 20 admin trunk mode : on 6-11

12 Configuring Port Parameters Chapter 6 oper trunk mode : on Allowed Vsan List : all(1-4093) Active Vsan List : 20 Active Vsan Up List : 20 SFP State : Present SFP product id : DS-SFP-FC4G-SW SFP Vendor id : FTLF8524P2BNL-C2 SFP Vendor Serial Number : FNS111213A1 SFP CLEI Code : COUIAAHCAA SFP Cisco Part Number : SFP VID : V01 Configuring the Trunk Mode Trunking enables interconnect ports to transmit and receive frames in more than one VSAN, over the same physical link, using Extended ISL (EISL) frame format. To configure the trunk mode, perform the following steps: Enter the interface for which you want to configure the trunk mode: interface fc 2/1 Set the trunk mode. Enter the following command to set the trunk mode to on : interface fc 2/1 switchport trunk mode on Enter the following command to set the trunk mode to off : interface fc 2/1 switchport trunk mode off Enter the following command to set the trunk mode to auto : interface fc 2/1 switchport trunk mode auto Displaying the Current Port Settings To display the current port setting, perform the following steps: 6-12

13 Chapter 6 Configuring Port Parameters Display the port settings: show interface fc <slot/port> The following example shows port settings for slot 1 port 1: Fibre Channel Interface Information port : 2/1 name : 2/1 type : fc4gfx desc : 2/1 (129) last-change : Mon Jun 29 23:54: fc-address : 00:00:00 gateway wwnn : 20:00:00:1b:0d:00:47:05 wwpn : 20:00:00:1b:0d:00:47:15 mtu : 2048 auto-negotiate-supported : yes auto-negotiate : enabled admin-status : up oper-status : down admin-speed : 4gbps oper-speed : unknown admin-connection-type : force-e oper-connection-type : down link-trap : enabled principle switch wwnn : 20:01:00:1b:0d:00:47:05 port wwnn : 00:00:00:00:00:00:00:00 distributed svc timeout : 5000 error detect timeout : 2000 fabric stability timeout : 5000 receiver xmitter timeout : 100 resource allo timeout : check age : 5 hello dead interval : 80 hello interval : 20 link state ack interval : 5 link state refresh time : 30 max age : 60 admin domain id : 0 oper domain id : 0 interop mode : 0 connection error : 0 admin port vsan : 1 oper port vsan : unknown admin trunk mode : on oper trunk mode : off Allowed Vsan List : all(1-4093) Active Vsan List : none Active Vsan Up List : none SFP State : Present SFP product id : DS-SFP-FC4G-SW SFP Vendor id : FTLF8524P2BNL-C2 SFP Vendor Serial Number : FNS111213A1 SFP CLEI Code : COUIAAHCAA SFP Cisco Part Number : SFP VID : V

14 Configuring Port Parameters Chapter 6 Bringing Up a Fibre Channel Port You bring up a Fibre Channel interface port to run traffic over the port. To bring up a Fibre Channel gateway card with the CLI, perform the following steps: Open a CLI session, and log in as a user with Fibre Channel read-write privileges. (For more information about privilege levels and access levels, see Table 2-1 on page 2-2, Privilege Levels, and Table 2-2 on page 2-2, Access Levels. ) Login: super Password: xxxxx Enter the enable command to enter privileged EXEC mode: Enter the interface command with the fc keyword the slot#/port# identifier of the port to enter Fibre Channel interface configuration submode: interface fc 2/1 SFS-3504(config-if-fc-2/1)# Note On the Cisco SFS 3504 Series Switch, gateways can be inserted and configured in slots 1-4 only. Step 5 Enter the no shutdown command to bring up the card: SFS-3504(config-if-fc-2/1)# no shutdown SFS-3504(config-if-fc-2/1)# Shutting Down a Fibre Channel Port To bring down a module, perform the following steps: Open a CLI session, and log in as a user with Fibre Channel read-write privileges. (For more information about privilege levels and access levels, see Table 2-1 on page 2-2, Privilege Levels, and Table 2-2 on page 2-2, Access Levels. ) Login: super Password: xxxxx Enter privileged EXEC mode: 6-14

15 Chapter 6 Configuring Initiators, ITs, and ITLs Step 5 ure Identify the port to shut down: interface fc 2/1 Shut down the specified port: SFS-3504(config-if-fc-2/1)# shutdown Configuring Initiators, ITs, and ITLs This section includes the following topics: Creating and Configuring SRP Initiators, page 6-15 Configuring FC Targets, page 6-19 Configuring IT Pairs, page 6-20 Discovering ITLs, page 6-21 Configuring ITL Bindings, page 6-21 Creating and Configuring SRP Initiators Initiators are created using the eight-byte node GUID and the eight-byte initiator extension (currently zero on the SFS chassis). You can use the CLI to enable the switch chassis to perform all of the initiator-to-gateway port mappings for you, or you can manually configure the WWNN and WWPNs. This section includes the following topics: Performing Automatic Initiator-Port Mappings, page 6-15 Configuring Port Mappings Manually, page 6-17 Performing Automatic Initiator-Port Mappings Use the auto-bind command to enable the switch chassis to perform initiator-to-gateway port mappings. The Cisco 3504 Server Switch can accommodate Fibre Channel gateways in slots 1 through 4, with four ports for each gateway. The auto-bind command binds the new initiator to all possible ports. To allow the switch chassis to perform initiator-to gateway mappings, perform the following steps: FS-3504(config)# 6-15

16 Configuring Initiators, ITs, and ITLs Chapter 6 Enter the fc srp initiator command with the initiator GUID, followed by the auto-bind command: fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 auto-bind Enter the show fc srp initiator <initiator GUID> command to verify that the initiators were created, as shown in the following example: show fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 SRP Initiators guid: 01:00:00:00:00:00:00:00 extension: 00:00:00:00:00:00:00:00 description: init : wwnn: 20:05:00:1b:0d:00:ae:00 credit: 0 active-ports: none pkeys: bootup-target: 00:00:00:00:00:00:00:00 bootup-lu: 00:00:00:00:00:00:00:00 alt-bootup-target: 00:00:00:00:00:00:00:00 alt-bootup-lu: 00:00:00:00:00:00:00:00 action: auto-bind result: success wwpns: port wwpn fc-addr vsan 1/1 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/2 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/3 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/4 20:01:00:1b:0d:00:ae:12 00:00:00 1 2/1 20:05:00:1b:0d:00:ae:14 00:00:00 1 2/2 20:05:00:1b:0d:00:ae:14 00:00:00 1 2/3 20:05:00:1b:0d:00:ae:14 00:00:00 1 2/4 20:05:00:1b:0d:00:ae:14 00:00:00 1 3/1 20:05:00:1b:0d:00:ae:16 13:01:06 1 3/2 20:05:00:1b:0d:00:ae:16 00:00:00 1 3/3 20:05:00:1b:0d:00:ae:16 00:00:00 1 3/4 20:05:00:1b:0d:00:ae:16 00:00:00 1 4/1 20:05:00:1b:0d:00:ae:18 14:01:06 1 4/2 20:05:00:1b:0d:00:ae:18 00:00:00 1 4/3 20:05:00:1b:0d:00:ae:18 00:00:00 1 4/4 20:05:00:1b:0d:00:ae:18 00:00:00 1 The above example shows that the initiator that has been configured is automatically bound to all possible gateway ports in the chassis. 6-16

17 Chapter 6 Configuring Initiators, ITs, and ITLs Configuring Port Mappings Manually You can configure individual WWPNs for the initiator by using the CLI to suggest a unique value for the WWNN and WWPN. The process shown in this section is the manual equivalent of Performing Automatic Initiator-Port Mappings section on page To manually create SRP initiators on gateways in the Cisco SFS 3504 Server Switch, perform the following steps: Enter the fc srp initiator <Initiator-guid> <Initiator-extension> wwnn? command, as shown in the first line of the following example: fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 wwnn? <wwnn> - Initiator wwnn suggested wwnn = 20:01:00:1b:0d:00:47:00 fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 wwnn The output above shows that the switch chassis has suggested a WWNN for the new initiator. All WWNNs must be unique, so following the switch suggestion assures a unique WWNN. Follow the switch suggestion by entering the fc srp initiator <Initiator-guid> <Initiator-extension> wwnn command, followed by the suggested WWNN, as shown in the following example: fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 wwnn 20:01:00:1b:0d:00:47:00 Verify that the WWNN has been created by entering the show fc srp initiator <Initiator-guid> <Initiator-extension> command, as shown in the following example: show fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 SRP Initiators guid: 01:00:00:00:00:00:00:00 extension: 00:00:00:00:00:00:00:00 description: init : wwnn: 20:01:00:1b:0d:00:47:00 credit: 0 active-ports: none pkeys: bootup-target: 00:00:00:00:00:00:00:00 bootup-lu: 00:00:00:00:00:00:00:00 alt-bootup-target: 00:00:00:00:00:00:00:00 alt-bootup-lu: 00:00:00:00:00:00:00:00 action: none result: none wwpns: port wwpn fc-addr vsan The preceding example shows that a new initiator has been created but not bound to any gateway ports. 6-17

18 Configuring Initiators, ITs, and ITLs Chapter 6 Step 5 Bind this new initiator with one or more gateway ports by assigning a World Wide Port Name and a VSAN to the initiator so that the initiator can gain access to the Fibre Channel fabric. Enter the fc srp initiator-wwpn <Initiator-guid> <Initiator-extension> <slot/port> <WWPN> [vsan <VSAN ID] command, as shown in the following example that binds the initiator to gateway port 1/1: fc srp initiator-wwpn 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 1/1? <wwpn> - wwpn suggested wwpn = 20:01:00:1b:0d:00:ae:12 fc srp initiator-wwpn 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 1/1 The example above shows that the server switch suggests a unique WWPN value for this initiator, as is did for the WWNN in. Note In the Cisco 3504 Server Switch, each initiator needs a unique WWPN per gateway, and port 1 of each gateway must be assigned a WWPN. These Cisco 3504 gateway WWPN assignments are different from those a Cisco SFS 3012 Server Switch, in which each port has a unique WWPN. Step 6 Follow the switch suggestion by entering the fc srp initiator-wwpn <Initiator-guid> <Initiator-extension> <slot/port> <WWPN> [vsan <VSAN ID] command, as shown in the following example: fc srp initiator-wwpn 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 1/1 20:01:00:1b:0d:00:47:00 Step 7 Verify the configuration by entering the show fc srp initiator <Initiator-guid> <Initiator-extension> command, as shown in the following example: show fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 SRP Initiators guid: 01:00:00:00:00:00:00:00 extension: 00:00:00:00:00:00:00:00 description: init : wwnn: 20:01:00:1b:0d:00:47:00 credit: 0 active-ports: none pkeys: bootup-target: 00:00:00:00:00:00:00:00 bootup-lu: 00:00:00:00:00:00:00:00 alt-bootup-target: 00:00:00:00:00:00:00:00 alt-bootup-lu: 00:00:00:00:00:00:00:00 action: none result: none wwpns: port wwpn fc-addr vsan 1/1 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/2 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/3 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/4 20:01:00:1b:0d:00:ae:12 00:00:

19 Chapter 6 Configuring Initiators, ITs, and ITLs Step 8 Step 9 Exit configuration mode: exit Verify the initiator configuration by entering the show fc srp initiator <Initiator-guid> <Initiator-extension> command, as shown in the following example: show fc srp initiator <Initiator-guid> <Initiator-extension> show fc srp initiator 00:05:ad:00:00:03:02:20 00:00:00:00:00:00:00:00 SRP Initiators guid: 00:05:ad:00:00:03:02:20 extension: 00:00:00:00:00:00:00:00 description: linux-vs-1/1 wwnn: 2f:fe:00:05:ad:01:81:48 credit: 0 active-ports: 2/3 pkeys: bootup-target: 50:06:0e:80:00:43:3c:00 bootup-lu: 00:16:00:00:00:00:00:00 alt-bootup-target: 00:00:00:00:00:00:00:00 alt-bootup-lu: 00:00:00:00:00:00:00:00 action: discover-itl result: success wwpns: port wwpn fc-addr vsan 2/1 2f:fe:00:05:ad:05:81:48 00:00:00 1 2/2 2f:fe:00:05:ad:05:81:48 00:00:00 1 2/3 2f:fe:00:05:ad:05:81:48 64:03:03 1 2/4 2f:fe:00:05:ad:05:81:48 00:00:00 1 Configuring FC Targets Normally, targets are auto detected from the fabric. If you need to configure a target, use the fc srp target command. To configure a target, perform the following steps: Enter the fc srp target <WWPN> ioc-guid <guid> command: fc srp target 20:02:00:20:c2:06:18:13 ioc-guid 00:1b:0d:00:00:00:47:a4 6-19

20 Configuring Initiators, ITs, and ITLs Chapter 6 Verify the configuration by entering the show fc srp target command in user EXEC mode. If your target shows up in the command output, the configuration succeeded. show fc srp target SRP Targets wwpn: 20:02:00:20:c2:06:18:13 wwnn: 00:00:00:00:00:00:00:00 description: SRP.T10: C ioc-guid: 00:1b:0d:00:00:00:47:a4 service-name: SRP.T10: C protocol-ids: 00:00:00:00:00:00:00:00:00:00 fc-address: b0:00:01 mtu: 0 connection-type: down physical-access: 2/1 vsan: 20 Configuring IT Pairs If a WWPN has been assigned to an initiator, and some ports are active, then targets will be discovered. Once targets are discovered, IT pairs are automatically created based on the zoning in the fabric. However, you can create an IT pair manually. To configure an IT pair and to configure an individual port masking policy for a particular IT, perform the following steps: Configure the IT pair by entering the fc srp it <initiator-guid> <initiator-extension> <target-wwpn> command, as shown in the following example: fc srp it 00:05:ad:00:00:00:22:48 00:00:00:00:00:00:00:00 21:01:00:20:c2:03:31:99 Set the port mask for the IT pair by entering the fc srp it <initiator-guid> <initiator-extension> <target-wwpn> gateway-portmask-policy restricted <port/slot> command, as shown in the following example: fc srp it 00:05:ad:00:00:00:22:48 00:00:00:00:00:00:00:00 21:01:00:20:c2:03:31:99 gateway-portmask-policy restricted 2/1-2/2 6-20

21 Chapter 6 Configuring Initiators, ITs, and ITLs Verify your IT configurations by entering the show fc srp it <initiator-guid> <initiator-extension> <target wwpn> command, as shown in the following example: show fc srp it 00:05:ad:00:00:00:22:48 00:00:00:00:00:00:00:00 21:01:00:20:c2:03:31:99 SRP IT guid: 00:05:ad:00:00:00:22:48 extension: 00:00:00:00:00:00:00:00 target-wwpn: 21:01:00:20:c2:03:31:99 description: it non-restricted-ports: 2/1-2/4,3/1-3/4 active-ports: 2/1-2/2 physical-access: 2/1-2/2 mode: normal-mode action: none result: none Total: 1 its. Discovering ITLs To discover ITLs, perform the following steps: Enter the fc srp initiator discover-itl command in the following format: fc srp initiator <initiator-guid> <initiator-extension> discover-itl Configuring ITL Bindings ITL bindings are automatically created when you enter the discover-itl command. To configure an ITL binding and to configure the LUN policy for an individual ITL, perform the following steps: Enter the fc srp itl command in this format: fc srp itl <initiator-guid> <initiator-extension> <target-wwpn> <FC-lu-id> <srp-lu-id> 6-21

22 Configuring Initiators, ITs, and ITLs Chapter 6 Return to user EXEC mode: exit Verify the configuration: show fc srp itl 00:05:ad:00:00:00:22:48 00:00:00:00:00:00:00:00 21:01:00:20:c2:03:31:99 SRP ITL guid: 00:05:ad:00:00:00:22:48 extension: 00:00:00:00:00:00:00:00 target-wwpn: 21:01:00:20:c2:03:31:99 fc-lunid: 00:02:00:00:00:00:00:00 srp-lunid: 00:00:00:00:00:00:00:02 logical-id (raw 64 bytes): 02:01:00:22:54:4d:53:20:20:20:20:20:46:43:36:35 : 20:20:20:20:20:20:20:20:20:20:20:20:30:33:33:31 : 39:39:30:30:30:32:00:00:00:00:00:00:00:00:00:00 : 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 logical-id (formatted display): TMS FC description: itl device-category: random lun-policy: non restricted non-restricted-ports: 2/1-2/4,3/1-3/4 active-ports: 2/1-2/2 physical-access: 2/1-2/2 hi-mark: 16 max-retry: 5 min-io-timeout: 10 dynamic-path-affinity: false dynamic-gateway-port-loadbalancing: true dynamic-storage-port-loadbalancing: dynamic-gateway-port-failover: false dynamic-storage-port-failover: active-slots:

Fibre Channel Commands

Fibre Channel Commands CHAPTER 3 This chapter documents the following commands: fc srp initiator, page 3-2 fc srp initiator-wwpn, page 3-5 fc srp it, page 3-7 fc srp itl, page 3-9 fc srp lu, page 3-13 fc srp target, page 3-17

More information

Fibre Channel Gateway Overview

Fibre Channel Gateway Overview CHAPTER 5 This chapter describes the Fibre Channel gateways and includes the following sections: About the Fibre Channel Gateway, page 5-1 Terms and Concepts, page 5-2 Cisco SFS 3500 Fibre Channel Gateway

More information

Chassis Tasks. Viewing Cards on a Chassis. Viewing Card Summary Information CHAPTER

Chassis Tasks. Viewing Cards on a Chassis. Viewing Card Summary Information CHAPTER CHAPTER 3 These topics describe the Chassis display tasks: Viewing Cards on a Chassis, page 3-1 Viewing Internal Gateway Ports, page 3-8 Viewing Physical Ports on a Chassis, page 3-9 Viewing Power Supply

More information

C H A P T E R Commands Cisco SFS Product Family Command Reference OL

C H A P T E R Commands Cisco SFS Product Family Command Reference OL CHAPTER 3 This chapter documents the following commands: aaa accounting, page 3-8 aaa authorization, page 3-9 action, page 3-11 addr-option, page 3-12 authentication, page 3-14 auto-negotiate (Ethernet

More information

About Chassis Manager

About Chassis Manager CHAPTER 1 Chassis Manager runs directly on your Server Switch to perform administration tasks. This chapter discusses the various components of the interface. Chassis Manager runs on all Server Switches.

More information

SCSI RDMA Protocol. Introduction. Configuring SRP CHAPTER

SCSI RDMA Protocol. Introduction. Configuring SRP CHAPTER 4 CHAPTER This chapter describes SCSI RDMA protocol and includes the following sections: Introduction, page 4-1 Configuring SRP, page 4-1 Verifying SRP, page 4-7 See the Root and Non-root Conventions in

More information

Cisco SFS InfiniBand Fibre Channel Gateway User Guide

Cisco SFS InfiniBand Fibre Channel Gateway User Guide Cisco SFS InfiniBand Fibre Channel Gateway User Guide Release 2.8.0 June, 2007 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Configuring Fibre Channel Interfaces

Configuring Fibre Channel Interfaces This chapter contains the following sections:, page 1 Information About Fibre Channel Interfaces Licensing Requirements for Fibre Channel On Cisco Nexus 3000 Series switches, Fibre Channel capability is

More information

Advanced Fibre Channel Features

Advanced Fibre Channel Features This chapter describes how to configure advanced Fibre Channel features. This chapter includes the following sections: and Concepts, page 1 and Concepts Fibre Channel Timeout Values You can modify Fibre

More information

Chassis Display Tasks

Chassis Display Tasks CHAPTER 2 This chapter describes the chassis display tasks for Element Manager and contains these sections: Viewing Card Properties, page 2-2 Enabling a Card, page 2-4 Viewing the Card Inventory, page

More information

Interoperability Limitations

Interoperability Limitations CHAPTER 2 This chapter describes the restrictions and limitations imposed on specific vendor switches when working in interoperability mode. It includes the following sections: Cisco MDS 9000 Family, page

More information

Configuring Cisco Unified FEX Nexus 2348UPQ with Fiber Channel Interfaces

Configuring Cisco Unified FEX Nexus 2348UPQ with Fiber Channel Interfaces Configuring Cisco Unified FEX Nexus 2348UPQ with Fiber Channel Interfaces This chapter provides details about configuring native fiber channels on Cisco Nexus 2348UPQ FEX, and contains the following sections:

More information

Chassis Manager User Guide Release 2.3.0

Chassis Manager User Guide Release 2.3.0 Chassis Manager User Guide Release 2.3.0 Part Number: 10-00029-05-A0 Copyright 2004-2005 Topspin Communications, Inc. All rights reserved. The Topspin Switched Computing System, Topspin Host Channel Adapter,

More information

Command Line Interface Reference Guide Release 2.3.0

Command Line Interface Reference Guide Release 2.3.0 Command Line Interface Reference Guide Release 2.3.0 Part Number: 10-00012-07-A0 Copyright 2003-2005 Topspin Communications, Inc. All rights reserved. The Topspin Switched Computing System, Topspin Host

More information

Question: 1 You have a Cisco UCS cluster and you must recover a lost admin password. In which order must you power cycle the fabric interconnects?

Question: 1 You have a Cisco UCS cluster and you must recover a lost admin password. In which order must you power cycle the fabric interconnects? Volume: 327 Questions Question: 1 You have a Cisco UCS cluster and you must recover a lost admin password. In which order must you power cycle the fabric interconnects? A. primary first, and then secondary

More information

Configuring VSANs and Interfaces

Configuring VSANs and Interfaces CHAPTER 3 You can achieve higher security and greater stability in Fibre Channel fabrics by using virtual storage area networks (VSANs). VSANs provide isolation among devices that are physically connected

More information

Element Manager User Guide Release 2.3.0

Element Manager User Guide Release 2.3.0 Element Manager User Guide Release 2.3.0 Part Number: 10-00116-02-A0 Copyright 2004-2005 Topspin Communications, Inc. All rights reserved. The Topspin Switched Computing System, Topspin Host Channel Adapter,

More information

Interface Configuration Mode Commands

Interface Configuration Mode Commands Chapter 3 CLI Commands Interface Configuration Mode Commands Use the mode for setting, viewing, and testing the configuration of WAAS software features on a specific interface. To enter this mode, enter

More information

Configuring Dynamic VLAN Membership

Configuring Dynamic VLAN Membership CHAPTER 11 This chapter describes how to configure dynamic port VLAN membership by using the VLAN Membership Policy Server (VMPS). This chapter includes the following major sections: Understanding VMPS,

More information

Interoperability Guidelines for Non-Cisco Switches

Interoperability Guidelines for Non-Cisco Switches APPENDIXA Interoperability Guidelines for Non-Cisco Switches This appendix includes information on changing interop modes and describes release-specific behavior for certain versions of Brocade, McData,

More information

CCIE Data Center Storage Networking. Fibre Channel Switching Configuration. Nexus 5500UP FC Initialization Allocate interfaces as type FC

CCIE Data Center Storage Networking. Fibre Channel Switching Configuration. Nexus 5500UP FC Initialization Allocate interfaces as type FC CCIE Data Center Storage Networking Fibre Channel Switching Configuration Nexus 5500UP FC Initialization Allocate interfaces as type FC slot 1 port 25 32 type fc FC must start at top of module and count

More information

Chassis Tasks. Viewing Cards on a Chassis CHAPTER

Chassis Tasks. Viewing Cards on a Chassis CHAPTER CHAPTER 3 This chapter describes the Chassis Manager tasks and contains these sections: Viewing Cards on a Chassis, page 3-1 Viewing Internal Gateway Ports, page 3-7 Viewing Physical Ports on a Chassis,

More information

F port channel trunk from MDS 9148 (NPV) to MDS 9509 (NPIV) Configuration Example

F port channel trunk from MDS 9148 (NPV) to MDS 9509 (NPIV) Configuration Example F port channel trunk from MDS 9148 (NPV) to MDS 9509 (NPIV) Configuration Example Document ID: 117781 Contributed by Edward Mazurek, Cisco TAC Engineer. Sep 05, 2014 Contents Introduction Prerequisites

More information

Configuring PortChannels

Configuring PortChannels This chapter provides information about PortChannels and how to configure the PortChannels. Finding Feature Information, page 1 Information About PortChannels, page 1 Prerequisites for PortChannels, page

More information

Switch Interoperability Guide

Switch Interoperability Guide IBM FIbre Channel Switch Interoperability GUIDE v2 9 / 03 Fibre Channel IBM BladeCenter Switch Interoperability Guide v2 9/2003 S A N THE ONLY SOURCE FOR MULTI-VENDOR INTEROPERABILITY QLOGIC PRESS QLOGIC

More information

Inter-VSAN Routing Configuration

Inter-VSAN Routing Configuration CHAPTER 16 This chapter explains the inter-vsan routing (IVR) feature and provides details on sharing resources across VSANs using IVR management interfaces provided in the switch. This chapter includes

More information

Using the Cisco NX-OS Setup Utility

Using the Cisco NX-OS Setup Utility This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined

More information

Using the Cisco NX-OS Setup Utility

Using the Cisco NX-OS Setup Utility This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined

More information

Configuring FCoE NPV. Information About FCoE NPV. This chapter contains the following sections:

Configuring FCoE NPV. Information About FCoE NPV. This chapter contains the following sections: This chapter contains the following sections: Information About FCoE NPV, page 1 FCoE NPV Model, page 3 Mapping Requirements, page 4 Port Requirements, page 5 NPV Features, page 5 vpc Topologies, page

More information

Q&As. Troubleshooting Cisco Data Center Infrastructure. Pass Cisco Exam with 100% Guarantee

Q&As. Troubleshooting Cisco Data Center Infrastructure. Pass Cisco Exam with 100% Guarantee 300-180Q&As Troubleshooting Cisco Data Center Infrastructure Pass Cisco 300-180 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

Tech Note on Priority Transmit B2B Credits in MDS Switches

Tech Note on Priority Transmit B2B Credits in MDS Switches Tech Note on Priority Transmit B2B Credits in MDS Switches Contents Introduction Prerequisites Requirements Components Used Understand Priority Transmit B2B Credits in MDS Switch For an Inter-Switch Link

More information

Managing Network Adapters

Managing Network Adapters Managing Network Adapters This chapter includes the following sections: Overview of the Cisco UCS C-Series Network Adapters, page 1 Viewing Network Adapter Properties, page 3 Configuring Network Adapter

More information

Maintenance Tasks CHAPTER

Maintenance Tasks CHAPTER CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-3 Configuring Date and Time Properties,

More information

Service Profiles and Templates

Service Profiles and Templates Service Profile Templates, page 1 Service Profiles, page 3 Service Profile Templates Service profile templates enable you to quickly create several service profiles with the same basic parameters, such

More information

Getting Started. Enabling SSH

Getting Started. Enabling SSH This chapter provides an overview of the basic configurations that need to be completed before getting started with IOA-specific configurations: Enabling SSH, page 1 Enabling CFS, page 2 IP Access Lists,

More information

Cisco MDS 9000 Family Blade Switch Solutions Guide

Cisco MDS 9000 Family Blade Switch Solutions Guide . Solutions Guide Cisco MDS 9000 Family Blade Switch Solutions Guide Introduction This document provides design and configuration guidance for administrators implementing large-scale blade server deployments

More information

IBM Europe Announcement ZG , dated February 13, 2007

IBM Europe Announcement ZG , dated February 13, 2007 IBM Europe Announcement ZG07-0221, dated February 13, 2007 Cisco MDS 9200 for IBM System Storage switches, models 9216i and 9216A, offer enhanced performance, scalability, multiprotocol capabilities, and

More information

Configuring Interface Buffers

Configuring Interface Buffers This chapter provides information about interfaces buffers, its features, and how to configure the interface buffers Finding Feature Information, page 1 Information About Interface Buffers, page 1, page

More information

UCS Engineering Details for the SAN Administrator

UCS Engineering Details for the SAN Administrator UCS Engineering Details for the SAN Administrator Craig Ashapa 2 First things first: debunking a myth Today (June 2012 UCS 2.02m) there is no FCoE northbound of UCS unless you really really really want

More information

Configuring and Managing Zones

Configuring and Managing Zones Send documentation comments to mdsfeedback-doc@cisco.com CHAPTER 30 Zoning enables you to set up access control between storage devices or user groups. If you have administrator privileges in your fabric,

More information

Troubleshooting Zones and Zone Sets

Troubleshooting Zones and Zone Sets CHAPTER 14 This chapter describes how to identify and resolve problems that might occur while implementing zones and zone sets on switches in the Cisco MDS 9000 Family. It includes the following sections:

More information

Configuring Fabric Configuration Server

Configuring Fabric Configuration Server CHAPTER 12 This chapter describes the Fabric Configuration Server (FCS) feature provided in the Cisco MDS 9000 Family of directors and switches. It includes the following sections: About FCS, page 12-1

More information

Fibre Channel Switch Interoperability Guide

Fibre Channel Switch Interoperability Guide SIMPLE LOW COST SANS v4 12 04 IBM BladeCenter Fibre Channel Switch Interoperability Guide QLOGIC PRESS IBM BladeCenter Fibre Channel Switch Interoperability Guide Version 4.0 Copyright IBM Corporation

More information

Direct Attached Storage

Direct Attached Storage , page 1 Fibre Channel Switching Mode, page 1 Configuring Fibre Channel Switching Mode, page 2 Creating a Storage VSAN, page 3 Creating a VSAN for Fibre Channel Zoning, page 4 Configuring a Fibre Channel

More information

Configuring a Dual Fabric SAN Environment

Configuring a Dual Fabric SAN Environment CHAPTER 10 Dual fabric SAN environments are an important configuration requirement. You can use CSM modules in combination with the Inter-VSAN Routing (IVR) feature to operate across two isolated fabrics.

More information

Q&As. Troubleshooting Cisco Data Center Unified Computing. Pass Cisco Exam with 100% Guarantee

Q&As. Troubleshooting Cisco Data Center Unified Computing. Pass Cisco Exam with 100% Guarantee 642-035 Q&As Troubleshooting Cisco Data Center Unified Computing Pass Cisco 642-035 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

Configuring EtherChannels and Layer 2 Trunk Failover

Configuring EtherChannels and Layer 2 Trunk Failover 28 CHAPTER Configuring EtherChannels and Layer 2 Trunk Failover This chapter describes how to configure EtherChannels on Layer 2 ports on the switch. EtherChannel provides fault-tolerant high-speed links

More information

Cisco I/O Accelerator Deployment Guide

Cisco I/O Accelerator Deployment Guide Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves

More information

UCS deployment guide for Nimble Storage

UCS deployment guide for Nimble Storage Summary This article is intended as a how to guide to allow for successful deployment of Nimble Storage iscsi connectivity to Cisco UCS. Nimble Storage / Cisco UCS connectivity checklist: 1) Determine

More information

Maintenance Tasks CHAPTER

Maintenance Tasks CHAPTER CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-4 Configuring Date and Time Properties,

More information

Cisco UCS Local Zoning

Cisco UCS Local Zoning Configuration Guide Cisco UCS Local Zoning Configuration Guide May 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 30 Contents Overview...

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels Configuring Virtual Port Channels This chapter describes how to configure virtual port channels (vpcs) on Cisco Nexus 5000 Series switches. It contains the following sections: Information About vpcs, page

More information

FCoE Configuration Between VIC Adapter on UCS Rack Server and Nexus 5500 Switch

FCoE Configuration Between VIC Adapter on UCS Rack Server and Nexus 5500 Switch FCoE Configuration Between VIC Adapter on UCS Rack Server and Nexus 5500 Switch Document ID: 117280 Contributed by Padmanabhan, Cisco TAC Engineer. Mar 25, 2014 Contents Introduction Prerequisites Requirements

More information

MDS 9000 Core with Brocade 3900/12000 Edge Topology

MDS 9000 Core with Brocade 3900/12000 Edge Topology CHAPTER 6 MDS 9000 Core with Brocade 3900/12000 Edge Topology This chapter describes how to set up a basic core-edge topology with one MDS 9000 switch configured for interop mode 1 at the core and two

More information

Configuring EtherChannels and Link-State Tracking

Configuring EtherChannels and Link-State Tracking CHAPTER 37 Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the switch. EtherChannel provides fault-tolerant high-speed

More information

Configuring Service Profiles

Configuring Service Profiles This chapter includes the following sections: Service Profiles that Override Server Identity, page 1 Service Profiles that Inherit Server Identity, page 2 Guidelines and Recommendations for Service Profiles,

More information

Configuring SAN Port Channel

Configuring SAN Port Channel Configuring SAN Port Channel This chapter contains the following sections: Configuring SAN Port Channels, page 1 Configuring SAN Port Channels SAN port channels refer to the aggregation of multiple physical

More information

F Commands CHAPTER. Send documentation comments to

F Commands CHAPTER. Send documentation comments to CHAPTER 7 The commands in this chapter apply to the Cisco MDS 9000 Family of multilayer directors and fabric switches. All commands are shown here in alphabetical order regardless of command mode. Please

More information

Vendor: Cisco. Exam Code: Exam Name: Introducing Cisco Data Center Technologies. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Introducing Cisco Data Center Technologies. Version: Demo Vendor: Cisco Exam Code: 640-916 Exam Name: Introducing Cisco Data Center Technologies Version: Demo DEMO QUESTION 1 Which two Cisco Nexus 2000-Series Fabric Extenders support connections to both Cisco

More information

Cisco Nexus 5000 Series NX-OS SAN Switching Configuration Guide

Cisco Nexus 5000 Series NX-OS SAN Switching Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-xxxxx-xx THE

More information

MDS 9020 Switch Interoperability

MDS 9020 Switch Interoperability CHAPTER 10 This chapter describes how to connect the Cisco MDS 9020 fabric switch to a third-party switch, and it includes the following sections: Specifications, page 10-5 Expected Topology Behavior,

More information

Configuring EtherChannels and Layer 2 Trunk Failover

Configuring EtherChannels and Layer 2 Trunk Failover 35 CHAPTER Configuring EtherChannels and Layer 2 Trunk Failover This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the switch. EtherChannel provides fault-tolerant high-speed

More information

Scheduling Maintenance Jobs

Scheduling Maintenance Jobs CHAPTER 5 The Cisco MDS command scheduler feature helps you schedule configuration and maintenance jobs in any switch in the Cisco MDS 9000 Family.You can use this feature to schedule jobs on a one-time

More information

C H A P T E R InfiniBand Commands Cisco SFS 7000 Series Product Family Command Reference Guide OL

C H A P T E R InfiniBand Commands Cisco SFS 7000 Series Product Family Command Reference Guide OL CHAPTER 4 This chapter documents the following commands: ib sm db-sync, page 4-2 ib pm, page 4-4 ib sm, page 4-9 ib-agent, page 4-13 4-1 ib sm db-sync Chapter 4 ib sm db-sync To synchronize the databases

More information

Cisco MDS 9000 Family NX-OS Licensing Guide, Release 6.x

Cisco MDS 9000 Family NX-OS Licensing Guide, Release 6.x Cisco MDS 9000 Family NX-OS Licensing Guide, Release 6.x Revised: July 10, 2017, OL-29297-02 Licensing Cisco MDS 9000 Series NX-OS Software Features Licenses are available for all switches in the Cisco

More information

MDS 9000 Switch and McData Dual Core Topology (Interop Mode 1)

MDS 9000 Switch and McData Dual Core Topology (Interop Mode 1) 5 CHAPTER MDS 9000 Switch and McData Dual Core Topology (Interop Mode 1) This chapter describes how to set up a basic dual-core topology with an MDS 9000 switch configured for interop mode 1 and a McData

More information

Cisco Nexus 9000 Series NX-OS FC NPV Configuration Guide, Release 9.x

Cisco Nexus 9000 Series NX-OS FC NPV Configuration Guide, Release 9.x Cisco Nexus 9000 Series NX-OS FC NPV Configuration Guide, Release 9.x First Published: 2018-07-11 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

HS22, HS22v, HX5 Boot from SAN with QLogic on IBM UEFI system.

HS22, HS22v, HX5 Boot from SAN with QLogic on IBM UEFI system. HS22, HS22v, HX5 Boot from SAN with QLogic on IBM UEFI system. Martin Gingras Product Field Engineer, Canada mgingras@ca.ibm.com Acknowledgements Thank you to the many people who have contributed and reviewed

More information

UCS Direct Attached Storage and FC Zoning Configuration Example

UCS Direct Attached Storage and FC Zoning Configuration Example UCS Direct Attached Storage and FC Zoning Configuration Example Document ID: 116082 May 23, 2013 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information UCS

More information

Configuring and Managing Zones

Configuring and Managing Zones CHAPTER 5 Zoning enables you to set up access control between storage devices or user groups. If you have administrator privileges in your fabric, you can create zones to increase network security and

More information

For information about configuring these settings from Cluster Management Suite (CMS), refer to the online help.

For information about configuring these settings from Cluster Management Suite (CMS), refer to the online help. Configuring VLANs This chapter provides information about configuring virtual LANs (VLANs). It includes command-line interface (CLI) procedures for using commands that have been specifically created or

More information

vsphere 6.0 with HP ProLiant Gen9 Servers, OneView, 3PAR, Cisco Nexus 5600 and Brocade 6510 Deployment Guide

vsphere 6.0 with HP ProLiant Gen9 Servers, OneView, 3PAR, Cisco Nexus 5600 and Brocade 6510 Deployment Guide Technical white paper vsphere 6.0 with HP ProLiant Gen9 Servers, OneView, 3PAR, Cisco Nexus 5600 and Brocade 6510 Deployment Guide Updated: 4/30/2015 Hongjun Ma, HP DCA Table of contents Introduction...

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs, page 1 Guidelines and Limitations for vpcs, page 10 Configuring vpcs, page 11 Verifying the vpc Configuration, page 25 vpc Default

More information

Maintenance Tasks. About A/B Partition CHAPTER

Maintenance Tasks. About A/B Partition CHAPTER CHAPTER 4 These topics describe the Chassis Manager maintenance tasks: About A/B Partition, page 4-1 Configuring Basic System Information, page 4-2 Configuring System Global Settings, page 4-4 Configuring

More information

Fibre Channel and iscsi Configuration Guide for the Data ONTAP 8.0 Release Family

Fibre Channel and iscsi Configuration Guide for the Data ONTAP 8.0 Release Family IBM System Storage N series Fibre Channel and iscsi Configuration Guide for the Data ONTAP 8.0 Release Family GA32-0783-03 Table of Contents 3 Contents Preface... 7 Supported features... 7 Websites...

More information

Large SAN Design Best Practices Using Cisco MDS 9700 and MDS 9500 Multilayer Directors

Large SAN Design Best Practices Using Cisco MDS 9700 and MDS 9500 Multilayer Directors White Paper Large SAN Design Best Practices Using Cisco MDS 9700 and MDS 9500 Multilayer Directors What You Will Learn As SANs continue to grow in size, many factors need to be considered to help scale

More information

Cisco MDS 9000 Series Fabric Configuration Guide, Release 8.x

Cisco MDS 9000 Series Fabric Configuration Guide, Release 8.x Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 2018 Cisco Systems, Inc. All rights

More information

Configuring Port Security

Configuring Port Security 33 CHAPTER This chapter describes how to configure port security on the Catalyst 4500 series switch. It provides an overview of port security on the Catalyst 4500 series switch and details the configuration

More information

Troubleshooting Distributed Device Alias Services

Troubleshooting Distributed Device Alias Services CHAPTER 15 Troubleshooting Distributed Device Alias Services This chapter describes how to troubleshoot and resolve problems that might occur when using device aliases. It includes the following sections:

More information

IBM IBM Storage Networking Solutions Version 1.

IBM IBM Storage Networking Solutions Version 1. IBM 000-740 IBM Storage Networking Solutions Version 1 http://killexams.com/exam-detail/000-740 - disk storage subsystem with four (4) total ports - two (2) LTO3 tape drives to be attached Assuming best

More information

Configuring Host Router and Cisco Analog Video Gateway Module Interfaces

Configuring Host Router and Cisco Analog Video Gateway Module Interfaces Configuring Host Router and Cisco Analog Video Gateway Module Interfaces Last Updated: August 17, 2009 To configure the Cisco Analog Video Gateway network module after it is installed in your host Cisco

More information

Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards

Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards First Published: May 17, 2005 Last Updated: July 28, 2010 This document provides configuration tasks for the 4-port Cisco HWIC-4ESW and the 9-port

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control CHAPTER 18 This chapter describes how to configure port-based traffic control features on the Catalyst 3750 Metro switch. For complete syntax and usage information for the commands used in this chapter,

More information

ITBraindumps. Latest IT Braindumps study guide

ITBraindumps.   Latest IT Braindumps study guide ITBraindumps http://www.itbraindumps.com Latest IT Braindumps study guide Exam : 300-460 Title : Implementing and Troubleshooting the Cisco Cloud Infrastructure Vendor : Cisco Version : DEMO Get Latest

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs vpc Overview Information About vpcs, on page 1 Guidelines and Limitations for vpcs, on page 11 Verifying the vpc Configuration, on page

More information

Managing Modules. About Modules. Send documentation comments to CHAPTER

Managing Modules. About Modules. Send documentation comments to CHAPTER CHAPTER 19 This chapter describes how to manage switching and services modules (also known as line cards) and provides information on monitoring module states. This chapter includes the following sections:

More information

Designing and Deploying a Cisco Unified Computing System SAN Using Cisco MDS 9000 Family Switches

Designing and Deploying a Cisco Unified Computing System SAN Using Cisco MDS 9000 Family Switches Designing and Deploying a Cisco Unified Computing System SAN Using Cisco MDS 9000 Family Switches What You Will Learn The Cisco Unified Computing System helps address today s business challenges by streamlining

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

Configuring InterVLAN Routing

Configuring InterVLAN Routing CHAPTER 2 Configuring InterVLAN Routing This chapter describes how to configure the Multilayer Switch Feature Card (MSFC) for intervlan routing on the Catalyst 6000 family switches and MSFC. Note For more

More information

Configuring EtherChannels and Link-State Tracking

Configuring EtherChannels and Link-State Tracking 30 CHAPTER Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels on Layer 2 ports on the Catalyst 2960 switch. EtherChannel provides fault-tolerant high-speed

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25

More information

With 802.1X port-based authentication, the devices in the network have specific roles.

With 802.1X port-based authentication, the devices in the network have specific roles. This chapter contains the following sections: Information About 802.1X, page 1 Licensing Requirements for 802.1X, page 9 Prerequisites for 802.1X, page 9 802.1X Guidelines and Limitations, page 9 Default

More information

Exam : E : Networked Storage - SAN Specialist Exam for Storage Administrators. Title. Ver :

Exam : E : Networked Storage - SAN Specialist Exam for Storage Administrators. Title. Ver : Exam : Title : Networked Storage - SAN Specialist Exam for Storage Administrators Ver : 03.30.07 QUESTION 1 On the ControlCenter infrastructure server, Certkiller.com has added two McData DS-32M switches

More information

Configuring SPAN. Configuring SPAN. SPAN Sources. This chapter includes the following sections: Configuring SPAN, page 1

Configuring SPAN. Configuring SPAN. SPAN Sources. This chapter includes the following sections: Configuring SPAN, page 1 This chapter includes the following sections:, page 1 SPAN Sources The Switched Port Analyzer (SPAN) feature (sometimes called port mirroring or port monitoring) selects network traffic for analysis by

More information

Fibre Channel Specialist Lab

Fibre Channel Specialist Lab Fibre Channel Specialist Lab 203.21 Enterprise Fabric Suite Zoning Operation Objective: This lab will demonstrate the configuration and management of zoning in a QLogic fabric. Unless noted, all operations

More information

SANsurfer Fibre Channel Command Line Interface (CLI) Table of Contents

SANsurfer Fibre Channel Command Line Interface (CLI) Table of Contents SANsurfer Fibre Channel Command Line Interface (CLI) QLogic Corporation All rights reserved Table of Contents 1 Package Contents 2 Requirements 2.1 Hardware Requirements 2.2 Software Requirements 3 OS

More information

SAN Configuration Guide

SAN Configuration Guide ONTAP 9 SAN Configuration Guide November 2017 215-11168_G0 doccomments@netapp.com Updated for ONTAP 9.3 Table of Contents 3 Contents Considerations for iscsi configurations... 5 Ways to configure iscsi

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page

More information

Cisco MDS 9000 Series Switches

Cisco MDS 9000 Series Switches Cisco MDS 9000 Series Switches Overview of Cisco Storage Networking Solutions Cisco MDS 9000 Series Directors Cisco MDS 9718 Cisco MDS 9710 Cisco MDS 9706 Configuration Chassis, dual Supervisor-1E Module,

More information

Lab 1. CLI Navigation. Scenario. Initial Configuration for R1

Lab 1. CLI Navigation. Scenario. Initial Configuration for R1 Lab 1 CLI Navigation This lab covers the most basic skills for accessing and using the command-line interface (CLI) on a Cisco router or switch. Many of the small, picky details of how the CLI works cannot

More information