Configuring the Fibre Channel Gateway
|
|
- Marvin Wheeler
- 6 years ago
- Views:
Transcription
1 CHAPTER 6 This chapter describes Fibre Channel gateway configuration and includes the following sections: Before You Begin, page 6-1 Administering the Fibre Channel Gateway, page 6-1 Pre-configuration Checklist, page 6-2 Configuring a New Fibre Channel Gateway, page 6-2 Updating Existing Configurations, page 6-2 Bringing Up a Fibre Channel Gateway Module, page 6-3 Configuring Global Policies, page 6-5 Configuring Port Parameters, page 6-7 Configuring Initiators, ITs, and ITLs, page 6-15 Before You Begin If the gateway ports connect to a Fibre Channel switch, the corresponding Fibre Channel switch port needs to be configured as an E port. See the FC-switch specific documentation to obtain the set of appropriate commands to perform this configuration. If the gateway port connects directly to a storage device, then the storage port needs to act as an F port, which is usually the default behavior. See the storage-specific documentation to configure the storage port as an F port. Administering the Fibre Channel Gateway Use the CLI to administer your Fibre Channel gateway modules. See the Cisco SFS Product Family Command Reference. 6-1
2 Pre-configuration Checklist Chapter 6 Pre-configuration Checklist Before you can connect a Cisco Fibre Channel gateway port to a fabric, verify that the following tasks have been completed: The Fibre Channel gateway module is up. (See the Bringing Up a Fibre Channel Gateway Module section on page 6-3.) The Fibre Channel gateway port is up. (See the Bringing Up a Fibre Channel Port section on page 6-14.) You have set up the correct interop mode for the port. (See the About Interop Modes section on page 6-7.) You have set up the correct the domain ID for the port. (See the Setting Domain ID section on page 6-9.) You have set up the correct the port speed. (See the Setting the Port Speed section on page 6-10.) Configuring a New Fibre Channel Gateway After you install a new Fibre Channel gateway (see the Cisco SFS 3504 Multifabric Server Switch Hardware Installation Guide for more information), perform the following steps: Bring up your gateway (see the Bringing Up a Fibre Channel Gateway Module section on page 6-3) so that it can pass traffic. Configure global SRP/ITL attributes to assign default attributes to new ITLs. (See the Configuring Initiators, ITs, and ITLs section on page 6-15 for information about how to perform this step and the following steps in this section.) Discover ITLs (see the Configuring ITLs section) to provide communication paths between hosts and storage. Customize ITLs and ITs (see the Configuring Individual ITL Attributes section) to grant or deny storage access beyond defaults and to configure custom behavior beyond defaults. Updating Existing Configurations To make changes to existing Fibre Channel gateway configurations, perform any one of the following tasks in this section. (See the Configuring Initiators, ITs, and ITLs section on page 6-15 for information about how to perform the tasks in this section.) Reconfigure global ITL attributes (see the Configuring Individual ITL Attributes section) to change the default configuration of new ITLs. Note Remember that when you change global defaults, existing ITLs that you created with the original defaults do not change. You must reconfigure existing ITLs individually. Reconfigure existing ITLs (see the Configuring Individual ITL Attributes section) to update access and behavior as your SAN priorities and requirements change. 6-2
3 Chapter 6 Bringing Up a Fibre Channel Gateway Module Add additional ITLs (see the Configuring ITLs section) as you add storage devices and hosts. Bringing Up a Fibre Channel Gateway Module Bring up interface cards to run traffic between IB hosts and Fibre Channel storage. To bring up a Fibre Channel gateway module, perform the following steps: Open a CLI session, and log in as a user with Fibre Channel read-write access privileges. (For more information about privilege levels and access levels, see Table 2-1 on page 2-2, Privilege Levels, and Table 2-2 on page 2-2, Access Levels. ) Login: super Password: xxxxx Enter the enable command to enter Privileged EXEC mode: Enter the show card command to verify that your module booted successfully. Note Do not proceed until the boot stage field displays done and the boot status field displays success. show card Card Information admin oper admin oper oper slot type type status status code fc4port4g fc4port4g up up normal 2 fc4port4g fc4port4g up up normal 3 en6port1g3500 en6port1g3500 up up normal 4 en6port1g3500 en6port1g3500 up up normal 5* controllerib12port4xddr controllerib12port4xddr up up normal Card Boot Information boot boot boot slot stage status image done success image-a:sfs_os /build626 2 done success image-a:sfs_os /build626 3 done success image-a:sfs_os /build626 4 done success image-a:sfs_os /build626 5 done success image-a:sfs_os /build626 Card Seeprom product pca pca fru slot serial-number serial-number number number 6-3
4 Bringing Up a Fibre Channel Gateway Module Chapter JAB111501C5 JAB111501C JAB111501BF JAB111501BF JAB B JAB B JAB JAB JAB111902Z1 JAB111902Z Step 5 Enter global configuration mode. Enter the card command and the slot number in which your Fibre Channel gateway resides. card 2 SFS-3504(config-card-2)# Note On the Cisco SFS 3504 Series Switch, gateways can be inserted and configured in slots 1-4 only. Step 6 Enter the no shutdown command to bring up the card. SFS-3504(config-card-2)# no shutdown SFS-3504(config-card-2)# Bringing Down a Fibre Channel Module To bring down a module, follow these steps: Step 5 Open a CLI session, and log in as a user with Fibre Channel read-write privileges. (For more information about privilege levels and access levels, see Table 2-1 on page 2-2, Privilege Levels, and Table 2-2 on page 2-2, Access Levels. ) Login: super Password: xxxxx Enter privileged EXEC mode: Identify the module to be shut down: card 2 Shut down the module. SFS-3504(config-card-2)# shutdown 6-4
5 Chapter 6 Configuring Global Policies Configuring Global Policies When you configure global policies, you create a series of default characteristics for random access devices (disks) and sequential access devices (tape). These characteristics automatically apply to all initiators, ITs, and ITLs that you add thereafter. The global policies that you configure automatically apply to every ITL series that you create after that. If you make changes to the global policies on your device, those changes do not propagate to your existing ITLs; they only apply to the new ITLs as you create them. Note Configure global policies before you configure individual initiators, ITs, and ITLs. When you add initiators, ITs, and ITLs, you can customize them on an individual basis. For example, use global policies to deny all LUN access to all new initiators, and then grant each initiator access to only the LUNs that you want them to access. Configuring Port Mask Policy Initiator access to a gateway port can be restricted or allowed. By default, the policy is restricted. If access is set to restricted, you must manually configure the port mask to allow access to the gateway port. To manually configure the port mask, perform the following steps: Configure the port mask by entering the no fc srp-global gateway-portmask-policy restricted command. Configuring ITL Policies You can choose between configuring load-balancing or failover when configuring ITL policies. You cannot use both or neither one. To configure ITL policies, perform the following steps: Enter global configuration mode. Configure load balancing to specify if SRP traffic should be load-balanced across Fibre Channel ports: fc srp-global itl dynamic-gateway-port-loadbalancing 6-5
6 Configuring Global Policies Chapter 6 Step 5 Set the port failover. One active Fibre Channel port is used for SRP traffic. If the port goes down, then another active port takes over. fc srp-global itl dynamic-gateway-port-failover Set the number of times an SRP command should be retried on the Fibre Channel side: fc srp-global itl max-retry 10 Set the timeout value, in seconds, after which a command should be retried: fc srp-global itl min-io-timeout 120 Configuring the LUN Access Policy Initiator access to LUNs is restricted (default) or allowed. If the LUN access policy for any particular ITL (or for all ITLs) is restricted, any new initiator that gets created will inherit that policy. Consequently, this initiator is able to discover new LUNs (through the discover-itl process), but it is not able to connect to any of those LUNS. For the host to access any of the discovered LUNs, you must grant individual access to any of those discovered LUNs. If the LUN access policy is not restricted, any new initiator is able to discover LUNs and connect to any or all of them without user intervention. Administrative users can restrict individual host access to any individual LUN. To configure LUN access policy, perform the following steps: Enter global configuration mode. Enter the command to set the LU policy to restricted: fc srp-global lun-policy restricted Verifying Global Policies To verify global policies, perform the following steps: Enter privileged EXEC mode: Verify the configuration, as shown in the following example: show fc srp-global SRP Global Information default-gateway-portmask-policy : restricted 6-6
7 Chapter 6 Configuring Port Parameters default-lun-policy : restricted default-itl-hi-mark : 16 default-itl-max-retry : 5 default-itl-min-io-timeout : 10 default-itl-dynamic-path-affinity : false default-itl-dynamic-gateway-port-load-balancing : true default-itl-dynamic-gateway-port-failover : false default-seq-itl-hi-mark : 1 default-seq-itl-max-retry : 1 default-seq-itl-min-io-timeout : 60 default-seq-itl-dynamic-path-affinity : false default-seq-itl-dynamic-gateway-port-load-balancing : false default-seq-itl-dynamic-gateway-port-failover : true Configuring Port Parameters This section includes the following topics: About Interop Modes, page 6-7 Setting the Interop Mode, page 6-8 Setting Domain ID, page 6-9 Setting the Connection Type, page 6-9 Setting the Port Speed, page 6-10 Configuring the Trunk Mode, page 6-12 Displaying the Current Port Settings, page 6-12 Bringing Up a Fibre Channel Port, page 6-14 Shutting Down a Fibre Channel Port, page 6-14 About Interop Modes Interoperability is the facet of an implementation where multiple vendor products come in contact with each other. Fibre Channel standards have been put into place to guide vendors toward common external Fibre Channel interfaces. The gateway ports on the Cisco SFS 3504 Server Switch interoperate with Cisco MDS, Brocade, and McData switches and support the following interoperability modes: Default or Native Interop Mode 0 This mode is a port mode that defines the default port behavior, and it is recommended for a VSAN that is communicating with a SAN composed entirely of Cisco MDS 9000 switches. Interop Mode 1 This mode is the standard interoperability mode. It interoperates with Brocade McData, and Cisco MDS switches that have been configured for their own interoperability modes. Brocade, McData, and Cisco MDS switches must be running in interop mode for them to work with this port mode. Interop Mode 2 This mode, also known as legacy switch interop mode 2, allows seamless integration with specific Brocade switches with fewer than 16 ports that are running in their own native mode of operation. Brocade switches must be configured with core pid = 0 to work with this mode. 6-7
8 Configuring Port Parameters Chapter 6 Interop Mode 3 Similar to interop mode 2, interoperability mode 3 was introduced for Brocade switches that contained more than 16 ports. With this VSAN-based interop mode, Brocade switches do not need to be altered from their native mode (core pid = 1) and can be seamlessly added to a new or existing Cisco MDS SAN-OS VSAN. This mode is also known as legacy switch interop mode 3. Interop Mode 4 This mode, also known as legacy switch interop mode 4, provides seamless integration between the Cisco SFS 3504 Fibre Channel gateway and McData switches running in McData Fabric 1.0 interop mode. For more information about interop modes, see the Cisco MDS 9000 Family Switch-to-Switch Interoperability Configuration Guide. Setting the Interop Mode When setting the Interop mode, you must shut down the port first, set the mode, and then bring up the port again. For more information about interop modes, see the About Interop Modes section on page 6-7. To set the interop mode, perform the following steps: Step 5 Step 6 Step 7 Enter the interface for which you want to set the interop mode: (config)interface fc 2/1 SFS-3504(config-if-fc-2/1)# Shut down the port: (config-if-fc-2/1)# shutdown Determine which interop modes are available: (config-if-fc-2/1)# interop? Possible interop values: 0 Native mode 1 Brocade and McData in interop mode 2 Brocade with 16 or less ports in native mode 3 Brocade with more than 16 ports in native mode 4 McData in native mode Configure the interop mode. The following example shows how to configure Native mode: SFS-3504(config-if-fc-2/1)# interop 0 Bring up the port again: (config-if-fc-2/1)# no shutdown 6-8
9 Chapter 6 Configuring Port Parameters Setting Domain ID Domain IDs should be unique across the SAN. If you are connecting to the same fabric, all gateway ports on the same module can share the same domain ID. All active VSANS on the interface use the configured domain ID. Interop Mode 0 Domain ID values are 1 to 239. Interop Mode1 Domain ID values are 97 to 127 to accommodate the McData restriction in this same range. Interop Mode 2 Domain ID values are 1 to 239. Interop Mode 3 Domain ID values are 1 to 239. Interop Mode 4 Domain ID values are 97 to 127 to accommodate the McData restriction in this same range. Setting the domain ID is mandatory, and you must follow the steps in the recommended order. To set the domain ID, follow these steps: Step 5 Enter the interface for which you want to set the domain ID: interface fc 2/1 Shut down the port: (config-if-fc-2/1)# shutdown Set the domain ID: SFS-3504(config-if-fc-2/1)# domain <id> Bring up the port again: (config-if-fc-2/1)# no shutdown Setting the Connection Type For more information about connection types, see the Topologies section on page 5-4. To set the connection type, perform the following steps: Enter the interface for which you want to set the connection type: interface fc 2/1 6-9
10 Configuring Port Parameters Chapter 6 Shut down the port: (config-if-fc-2/1)# shutdown Set the connection type. Select from the following connection types: Force E Set this type when connecting to a Fibre Channel switch. Force F Set this type when connecting direct-attached storage. Force E or F Set this type to detect the connection type. Set the connection type to Force E with the following command: SFS-3504(config-if-fc-2/1)# connection-type force-e Set the connection type to Force F with the following command: SFS-3504(config-if-fc-2/1)# connection-type force-f Set the connection type to Force E or F with the following command: SFS-3504(config-if-fc-2/1)# connection-type auto-e-or-f Step 5 Bring up the port again: (config-if-fc-2/1)# no shutdown Setting the Port Speed You can set the port speed to 1 Gbps, 2 Gbps, or 4 Gbps on a Cisco SFS 3504 Server Switch. When you set the speed, you need to set the port speed value to 1000, 2000, or Note Using the auto-negotiate command overrides the speed setting. You must disable auto-negotiation with the no auto-negotiate command to set the port speed. To set the port speed, follow these steps: Enter the interface for which you want to set the port speed: interface fc 2/1 Set the port speed: SFS-3504(config-if-fc-2/1)# speed
11 Chapter 6 Configuring Port Parameters Setting the Port VSAN By default, all ports are assigned the VSAN ID of 1. To change a port VSAN, perform the following steps: Enter the interface that you want to assign to a VSAN: interface fc 2/1 Assign the port to the VSAN: SFS-3504(config-if-fc-2/1)# vsan 20 The following output shows the assigned port VSAN: Fibre Channel Interface Information port : 2/1 name : 2/1 type : fc4gfx desc : 2/1 (129) last-change : Tue Jun 30 18:29: fc-address : 00:00:00 gateway wwnn : 20:00:00:1b:0d:00:47:05 wwpn : 20:00:00:1b:0d:00:47:15 mtu : 2048 auto-negotiate-supported : yes auto-negotiate : enabled admin-status : up oper-status : up admin-speed : 4gbps oper-speed : 2gbps admin-connection-type : force-e oper-connection-type : E-port link-trap : enabled principle switch wwnn : 20:14:00:0d:ec:0e:fd:c1 port wwnn : 00:00:00:00:00:00:00:00 distributed svc timeout : 5000 error detect timeout : 2000 fabric stability timeout : 5000 receiver xmitter timeout : 100 resource allo timeout : check age : 5 hello dead interval : 80 hello interval : 20 link state ack interval : 5 link state refresh time : 30 max age : 60 admin domain id : 20 oper domain id : 20 interop mode : 0 connection error : 0 admin port vsan : 20 oper port vsan : 20 admin trunk mode : on 6-11
12 Configuring Port Parameters Chapter 6 oper trunk mode : on Allowed Vsan List : all(1-4093) Active Vsan List : 20 Active Vsan Up List : 20 SFP State : Present SFP product id : DS-SFP-FC4G-SW SFP Vendor id : FTLF8524P2BNL-C2 SFP Vendor Serial Number : FNS111213A1 SFP CLEI Code : COUIAAHCAA SFP Cisco Part Number : SFP VID : V01 Configuring the Trunk Mode Trunking enables interconnect ports to transmit and receive frames in more than one VSAN, over the same physical link, using Extended ISL (EISL) frame format. To configure the trunk mode, perform the following steps: Enter the interface for which you want to configure the trunk mode: interface fc 2/1 Set the trunk mode. Enter the following command to set the trunk mode to on : interface fc 2/1 switchport trunk mode on Enter the following command to set the trunk mode to off : interface fc 2/1 switchport trunk mode off Enter the following command to set the trunk mode to auto : interface fc 2/1 switchport trunk mode auto Displaying the Current Port Settings To display the current port setting, perform the following steps: 6-12
13 Chapter 6 Configuring Port Parameters Display the port settings: show interface fc <slot/port> The following example shows port settings for slot 1 port 1: Fibre Channel Interface Information port : 2/1 name : 2/1 type : fc4gfx desc : 2/1 (129) last-change : Mon Jun 29 23:54: fc-address : 00:00:00 gateway wwnn : 20:00:00:1b:0d:00:47:05 wwpn : 20:00:00:1b:0d:00:47:15 mtu : 2048 auto-negotiate-supported : yes auto-negotiate : enabled admin-status : up oper-status : down admin-speed : 4gbps oper-speed : unknown admin-connection-type : force-e oper-connection-type : down link-trap : enabled principle switch wwnn : 20:01:00:1b:0d:00:47:05 port wwnn : 00:00:00:00:00:00:00:00 distributed svc timeout : 5000 error detect timeout : 2000 fabric stability timeout : 5000 receiver xmitter timeout : 100 resource allo timeout : check age : 5 hello dead interval : 80 hello interval : 20 link state ack interval : 5 link state refresh time : 30 max age : 60 admin domain id : 0 oper domain id : 0 interop mode : 0 connection error : 0 admin port vsan : 1 oper port vsan : unknown admin trunk mode : on oper trunk mode : off Allowed Vsan List : all(1-4093) Active Vsan List : none Active Vsan Up List : none SFP State : Present SFP product id : DS-SFP-FC4G-SW SFP Vendor id : FTLF8524P2BNL-C2 SFP Vendor Serial Number : FNS111213A1 SFP CLEI Code : COUIAAHCAA SFP Cisco Part Number : SFP VID : V
14 Configuring Port Parameters Chapter 6 Bringing Up a Fibre Channel Port You bring up a Fibre Channel interface port to run traffic over the port. To bring up a Fibre Channel gateway card with the CLI, perform the following steps: Open a CLI session, and log in as a user with Fibre Channel read-write privileges. (For more information about privilege levels and access levels, see Table 2-1 on page 2-2, Privilege Levels, and Table 2-2 on page 2-2, Access Levels. ) Login: super Password: xxxxx Enter the enable command to enter privileged EXEC mode: Enter the interface command with the fc keyword the slot#/port# identifier of the port to enter Fibre Channel interface configuration submode: interface fc 2/1 SFS-3504(config-if-fc-2/1)# Note On the Cisco SFS 3504 Series Switch, gateways can be inserted and configured in slots 1-4 only. Step 5 Enter the no shutdown command to bring up the card: SFS-3504(config-if-fc-2/1)# no shutdown SFS-3504(config-if-fc-2/1)# Shutting Down a Fibre Channel Port To bring down a module, perform the following steps: Open a CLI session, and log in as a user with Fibre Channel read-write privileges. (For more information about privilege levels and access levels, see Table 2-1 on page 2-2, Privilege Levels, and Table 2-2 on page 2-2, Access Levels. ) Login: super Password: xxxxx Enter privileged EXEC mode: 6-14
15 Chapter 6 Configuring Initiators, ITs, and ITLs Step 5 ure Identify the port to shut down: interface fc 2/1 Shut down the specified port: SFS-3504(config-if-fc-2/1)# shutdown Configuring Initiators, ITs, and ITLs This section includes the following topics: Creating and Configuring SRP Initiators, page 6-15 Configuring FC Targets, page 6-19 Configuring IT Pairs, page 6-20 Discovering ITLs, page 6-21 Configuring ITL Bindings, page 6-21 Creating and Configuring SRP Initiators Initiators are created using the eight-byte node GUID and the eight-byte initiator extension (currently zero on the SFS chassis). You can use the CLI to enable the switch chassis to perform all of the initiator-to-gateway port mappings for you, or you can manually configure the WWNN and WWPNs. This section includes the following topics: Performing Automatic Initiator-Port Mappings, page 6-15 Configuring Port Mappings Manually, page 6-17 Performing Automatic Initiator-Port Mappings Use the auto-bind command to enable the switch chassis to perform initiator-to-gateway port mappings. The Cisco 3504 Server Switch can accommodate Fibre Channel gateways in slots 1 through 4, with four ports for each gateway. The auto-bind command binds the new initiator to all possible ports. To allow the switch chassis to perform initiator-to gateway mappings, perform the following steps: FS-3504(config)# 6-15
16 Configuring Initiators, ITs, and ITLs Chapter 6 Enter the fc srp initiator command with the initiator GUID, followed by the auto-bind command: fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 auto-bind Enter the show fc srp initiator <initiator GUID> command to verify that the initiators were created, as shown in the following example: show fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 SRP Initiators guid: 01:00:00:00:00:00:00:00 extension: 00:00:00:00:00:00:00:00 description: init : wwnn: 20:05:00:1b:0d:00:ae:00 credit: 0 active-ports: none pkeys: bootup-target: 00:00:00:00:00:00:00:00 bootup-lu: 00:00:00:00:00:00:00:00 alt-bootup-target: 00:00:00:00:00:00:00:00 alt-bootup-lu: 00:00:00:00:00:00:00:00 action: auto-bind result: success wwpns: port wwpn fc-addr vsan 1/1 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/2 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/3 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/4 20:01:00:1b:0d:00:ae:12 00:00:00 1 2/1 20:05:00:1b:0d:00:ae:14 00:00:00 1 2/2 20:05:00:1b:0d:00:ae:14 00:00:00 1 2/3 20:05:00:1b:0d:00:ae:14 00:00:00 1 2/4 20:05:00:1b:0d:00:ae:14 00:00:00 1 3/1 20:05:00:1b:0d:00:ae:16 13:01:06 1 3/2 20:05:00:1b:0d:00:ae:16 00:00:00 1 3/3 20:05:00:1b:0d:00:ae:16 00:00:00 1 3/4 20:05:00:1b:0d:00:ae:16 00:00:00 1 4/1 20:05:00:1b:0d:00:ae:18 14:01:06 1 4/2 20:05:00:1b:0d:00:ae:18 00:00:00 1 4/3 20:05:00:1b:0d:00:ae:18 00:00:00 1 4/4 20:05:00:1b:0d:00:ae:18 00:00:00 1 The above example shows that the initiator that has been configured is automatically bound to all possible gateway ports in the chassis. 6-16
17 Chapter 6 Configuring Initiators, ITs, and ITLs Configuring Port Mappings Manually You can configure individual WWPNs for the initiator by using the CLI to suggest a unique value for the WWNN and WWPN. The process shown in this section is the manual equivalent of Performing Automatic Initiator-Port Mappings section on page To manually create SRP initiators on gateways in the Cisco SFS 3504 Server Switch, perform the following steps: Enter the fc srp initiator <Initiator-guid> <Initiator-extension> wwnn? command, as shown in the first line of the following example: fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 wwnn? <wwnn> - Initiator wwnn suggested wwnn = 20:01:00:1b:0d:00:47:00 fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 wwnn The output above shows that the switch chassis has suggested a WWNN for the new initiator. All WWNNs must be unique, so following the switch suggestion assures a unique WWNN. Follow the switch suggestion by entering the fc srp initiator <Initiator-guid> <Initiator-extension> wwnn command, followed by the suggested WWNN, as shown in the following example: fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 wwnn 20:01:00:1b:0d:00:47:00 Verify that the WWNN has been created by entering the show fc srp initiator <Initiator-guid> <Initiator-extension> command, as shown in the following example: show fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 SRP Initiators guid: 01:00:00:00:00:00:00:00 extension: 00:00:00:00:00:00:00:00 description: init : wwnn: 20:01:00:1b:0d:00:47:00 credit: 0 active-ports: none pkeys: bootup-target: 00:00:00:00:00:00:00:00 bootup-lu: 00:00:00:00:00:00:00:00 alt-bootup-target: 00:00:00:00:00:00:00:00 alt-bootup-lu: 00:00:00:00:00:00:00:00 action: none result: none wwpns: port wwpn fc-addr vsan The preceding example shows that a new initiator has been created but not bound to any gateway ports. 6-17
18 Configuring Initiators, ITs, and ITLs Chapter 6 Step 5 Bind this new initiator with one or more gateway ports by assigning a World Wide Port Name and a VSAN to the initiator so that the initiator can gain access to the Fibre Channel fabric. Enter the fc srp initiator-wwpn <Initiator-guid> <Initiator-extension> <slot/port> <WWPN> [vsan <VSAN ID] command, as shown in the following example that binds the initiator to gateway port 1/1: fc srp initiator-wwpn 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 1/1? <wwpn> - wwpn suggested wwpn = 20:01:00:1b:0d:00:ae:12 fc srp initiator-wwpn 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 1/1 The example above shows that the server switch suggests a unique WWPN value for this initiator, as is did for the WWNN in. Note In the Cisco 3504 Server Switch, each initiator needs a unique WWPN per gateway, and port 1 of each gateway must be assigned a WWPN. These Cisco 3504 gateway WWPN assignments are different from those a Cisco SFS 3012 Server Switch, in which each port has a unique WWPN. Step 6 Follow the switch suggestion by entering the fc srp initiator-wwpn <Initiator-guid> <Initiator-extension> <slot/port> <WWPN> [vsan <VSAN ID] command, as shown in the following example: fc srp initiator-wwpn 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 1/1 20:01:00:1b:0d:00:47:00 Step 7 Verify the configuration by entering the show fc srp initiator <Initiator-guid> <Initiator-extension> command, as shown in the following example: show fc srp initiator 01:00:00:00:00:00:00:00 00:00:00:00:00:00:00:00 SRP Initiators guid: 01:00:00:00:00:00:00:00 extension: 00:00:00:00:00:00:00:00 description: init : wwnn: 20:01:00:1b:0d:00:47:00 credit: 0 active-ports: none pkeys: bootup-target: 00:00:00:00:00:00:00:00 bootup-lu: 00:00:00:00:00:00:00:00 alt-bootup-target: 00:00:00:00:00:00:00:00 alt-bootup-lu: 00:00:00:00:00:00:00:00 action: none result: none wwpns: port wwpn fc-addr vsan 1/1 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/2 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/3 20:01:00:1b:0d:00:ae:12 00:00:00 1 1/4 20:01:00:1b:0d:00:ae:12 00:00:
19 Chapter 6 Configuring Initiators, ITs, and ITLs Step 8 Step 9 Exit configuration mode: exit Verify the initiator configuration by entering the show fc srp initiator <Initiator-guid> <Initiator-extension> command, as shown in the following example: show fc srp initiator <Initiator-guid> <Initiator-extension> show fc srp initiator 00:05:ad:00:00:03:02:20 00:00:00:00:00:00:00:00 SRP Initiators guid: 00:05:ad:00:00:03:02:20 extension: 00:00:00:00:00:00:00:00 description: linux-vs-1/1 wwnn: 2f:fe:00:05:ad:01:81:48 credit: 0 active-ports: 2/3 pkeys: bootup-target: 50:06:0e:80:00:43:3c:00 bootup-lu: 00:16:00:00:00:00:00:00 alt-bootup-target: 00:00:00:00:00:00:00:00 alt-bootup-lu: 00:00:00:00:00:00:00:00 action: discover-itl result: success wwpns: port wwpn fc-addr vsan 2/1 2f:fe:00:05:ad:05:81:48 00:00:00 1 2/2 2f:fe:00:05:ad:05:81:48 00:00:00 1 2/3 2f:fe:00:05:ad:05:81:48 64:03:03 1 2/4 2f:fe:00:05:ad:05:81:48 00:00:00 1 Configuring FC Targets Normally, targets are auto detected from the fabric. If you need to configure a target, use the fc srp target command. To configure a target, perform the following steps: Enter the fc srp target <WWPN> ioc-guid <guid> command: fc srp target 20:02:00:20:c2:06:18:13 ioc-guid 00:1b:0d:00:00:00:47:a4 6-19
20 Configuring Initiators, ITs, and ITLs Chapter 6 Verify the configuration by entering the show fc srp target command in user EXEC mode. If your target shows up in the command output, the configuration succeeded. show fc srp target SRP Targets wwpn: 20:02:00:20:c2:06:18:13 wwnn: 00:00:00:00:00:00:00:00 description: SRP.T10: C ioc-guid: 00:1b:0d:00:00:00:47:a4 service-name: SRP.T10: C protocol-ids: 00:00:00:00:00:00:00:00:00:00 fc-address: b0:00:01 mtu: 0 connection-type: down physical-access: 2/1 vsan: 20 Configuring IT Pairs If a WWPN has been assigned to an initiator, and some ports are active, then targets will be discovered. Once targets are discovered, IT pairs are automatically created based on the zoning in the fabric. However, you can create an IT pair manually. To configure an IT pair and to configure an individual port masking policy for a particular IT, perform the following steps: Configure the IT pair by entering the fc srp it <initiator-guid> <initiator-extension> <target-wwpn> command, as shown in the following example: fc srp it 00:05:ad:00:00:00:22:48 00:00:00:00:00:00:00:00 21:01:00:20:c2:03:31:99 Set the port mask for the IT pair by entering the fc srp it <initiator-guid> <initiator-extension> <target-wwpn> gateway-portmask-policy restricted <port/slot> command, as shown in the following example: fc srp it 00:05:ad:00:00:00:22:48 00:00:00:00:00:00:00:00 21:01:00:20:c2:03:31:99 gateway-portmask-policy restricted 2/1-2/2 6-20
21 Chapter 6 Configuring Initiators, ITs, and ITLs Verify your IT configurations by entering the show fc srp it <initiator-guid> <initiator-extension> <target wwpn> command, as shown in the following example: show fc srp it 00:05:ad:00:00:00:22:48 00:00:00:00:00:00:00:00 21:01:00:20:c2:03:31:99 SRP IT guid: 00:05:ad:00:00:00:22:48 extension: 00:00:00:00:00:00:00:00 target-wwpn: 21:01:00:20:c2:03:31:99 description: it non-restricted-ports: 2/1-2/4,3/1-3/4 active-ports: 2/1-2/2 physical-access: 2/1-2/2 mode: normal-mode action: none result: none Total: 1 its. Discovering ITLs To discover ITLs, perform the following steps: Enter the fc srp initiator discover-itl command in the following format: fc srp initiator <initiator-guid> <initiator-extension> discover-itl Configuring ITL Bindings ITL bindings are automatically created when you enter the discover-itl command. To configure an ITL binding and to configure the LUN policy for an individual ITL, perform the following steps: Enter the fc srp itl command in this format: fc srp itl <initiator-guid> <initiator-extension> <target-wwpn> <FC-lu-id> <srp-lu-id> 6-21
22 Configuring Initiators, ITs, and ITLs Chapter 6 Return to user EXEC mode: exit Verify the configuration: show fc srp itl 00:05:ad:00:00:00:22:48 00:00:00:00:00:00:00:00 21:01:00:20:c2:03:31:99 SRP ITL guid: 00:05:ad:00:00:00:22:48 extension: 00:00:00:00:00:00:00:00 target-wwpn: 21:01:00:20:c2:03:31:99 fc-lunid: 00:02:00:00:00:00:00:00 srp-lunid: 00:00:00:00:00:00:00:02 logical-id (raw 64 bytes): 02:01:00:22:54:4d:53:20:20:20:20:20:46:43:36:35 : 20:20:20:20:20:20:20:20:20:20:20:20:30:33:33:31 : 39:39:30:30:30:32:00:00:00:00:00:00:00:00:00:00 : 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 logical-id (formatted display): TMS FC description: itl device-category: random lun-policy: non restricted non-restricted-ports: 2/1-2/4,3/1-3/4 active-ports: 2/1-2/2 physical-access: 2/1-2/2 hi-mark: 16 max-retry: 5 min-io-timeout: 10 dynamic-path-affinity: false dynamic-gateway-port-loadbalancing: true dynamic-storage-port-loadbalancing: dynamic-gateway-port-failover: false dynamic-storage-port-failover: active-slots:
Fibre Channel Commands
CHAPTER 3 This chapter documents the following commands: fc srp initiator, page 3-2 fc srp initiator-wwpn, page 3-5 fc srp it, page 3-7 fc srp itl, page 3-9 fc srp lu, page 3-13 fc srp target, page 3-17
More informationFibre Channel Gateway Overview
CHAPTER 5 This chapter describes the Fibre Channel gateways and includes the following sections: About the Fibre Channel Gateway, page 5-1 Terms and Concepts, page 5-2 Cisco SFS 3500 Fibre Channel Gateway
More informationChassis Tasks. Viewing Cards on a Chassis. Viewing Card Summary Information CHAPTER
CHAPTER 3 These topics describe the Chassis display tasks: Viewing Cards on a Chassis, page 3-1 Viewing Internal Gateway Ports, page 3-8 Viewing Physical Ports on a Chassis, page 3-9 Viewing Power Supply
More informationC H A P T E R Commands Cisco SFS Product Family Command Reference OL
CHAPTER 3 This chapter documents the following commands: aaa accounting, page 3-8 aaa authorization, page 3-9 action, page 3-11 addr-option, page 3-12 authentication, page 3-14 auto-negotiate (Ethernet
More informationAbout Chassis Manager
CHAPTER 1 Chassis Manager runs directly on your Server Switch to perform administration tasks. This chapter discusses the various components of the interface. Chassis Manager runs on all Server Switches.
More informationSCSI RDMA Protocol. Introduction. Configuring SRP CHAPTER
4 CHAPTER This chapter describes SCSI RDMA protocol and includes the following sections: Introduction, page 4-1 Configuring SRP, page 4-1 Verifying SRP, page 4-7 See the Root and Non-root Conventions in
More informationCisco SFS InfiniBand Fibre Channel Gateway User Guide
Cisco SFS InfiniBand Fibre Channel Gateway User Guide Release 2.8.0 June, 2007 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408
More informationConfiguring Fibre Channel Interfaces
This chapter contains the following sections:, page 1 Information About Fibre Channel Interfaces Licensing Requirements for Fibre Channel On Cisco Nexus 3000 Series switches, Fibre Channel capability is
More informationAdvanced Fibre Channel Features
This chapter describes how to configure advanced Fibre Channel features. This chapter includes the following sections: and Concepts, page 1 and Concepts Fibre Channel Timeout Values You can modify Fibre
More informationChassis Display Tasks
CHAPTER 2 This chapter describes the chassis display tasks for Element Manager and contains these sections: Viewing Card Properties, page 2-2 Enabling a Card, page 2-4 Viewing the Card Inventory, page
More informationInteroperability Limitations
CHAPTER 2 This chapter describes the restrictions and limitations imposed on specific vendor switches when working in interoperability mode. It includes the following sections: Cisco MDS 9000 Family, page
More informationConfiguring Cisco Unified FEX Nexus 2348UPQ with Fiber Channel Interfaces
Configuring Cisco Unified FEX Nexus 2348UPQ with Fiber Channel Interfaces This chapter provides details about configuring native fiber channels on Cisco Nexus 2348UPQ FEX, and contains the following sections:
More informationChassis Manager User Guide Release 2.3.0
Chassis Manager User Guide Release 2.3.0 Part Number: 10-00029-05-A0 Copyright 2004-2005 Topspin Communications, Inc. All rights reserved. The Topspin Switched Computing System, Topspin Host Channel Adapter,
More informationCommand Line Interface Reference Guide Release 2.3.0
Command Line Interface Reference Guide Release 2.3.0 Part Number: 10-00012-07-A0 Copyright 2003-2005 Topspin Communications, Inc. All rights reserved. The Topspin Switched Computing System, Topspin Host
More informationQuestion: 1 You have a Cisco UCS cluster and you must recover a lost admin password. In which order must you power cycle the fabric interconnects?
Volume: 327 Questions Question: 1 You have a Cisco UCS cluster and you must recover a lost admin password. In which order must you power cycle the fabric interconnects? A. primary first, and then secondary
More informationConfiguring VSANs and Interfaces
CHAPTER 3 You can achieve higher security and greater stability in Fibre Channel fabrics by using virtual storage area networks (VSANs). VSANs provide isolation among devices that are physically connected
More informationElement Manager User Guide Release 2.3.0
Element Manager User Guide Release 2.3.0 Part Number: 10-00116-02-A0 Copyright 2004-2005 Topspin Communications, Inc. All rights reserved. The Topspin Switched Computing System, Topspin Host Channel Adapter,
More informationInterface Configuration Mode Commands
Chapter 3 CLI Commands Interface Configuration Mode Commands Use the mode for setting, viewing, and testing the configuration of WAAS software features on a specific interface. To enter this mode, enter
More informationConfiguring Dynamic VLAN Membership
CHAPTER 11 This chapter describes how to configure dynamic port VLAN membership by using the VLAN Membership Policy Server (VMPS). This chapter includes the following major sections: Understanding VMPS,
More informationInteroperability Guidelines for Non-Cisco Switches
APPENDIXA Interoperability Guidelines for Non-Cisco Switches This appendix includes information on changing interop modes and describes release-specific behavior for certain versions of Brocade, McData,
More informationCCIE Data Center Storage Networking. Fibre Channel Switching Configuration. Nexus 5500UP FC Initialization Allocate interfaces as type FC
CCIE Data Center Storage Networking Fibre Channel Switching Configuration Nexus 5500UP FC Initialization Allocate interfaces as type FC slot 1 port 25 32 type fc FC must start at top of module and count
More informationChassis Tasks. Viewing Cards on a Chassis CHAPTER
CHAPTER 3 This chapter describes the Chassis Manager tasks and contains these sections: Viewing Cards on a Chassis, page 3-1 Viewing Internal Gateway Ports, page 3-7 Viewing Physical Ports on a Chassis,
More informationF port channel trunk from MDS 9148 (NPV) to MDS 9509 (NPIV) Configuration Example
F port channel trunk from MDS 9148 (NPV) to MDS 9509 (NPIV) Configuration Example Document ID: 117781 Contributed by Edward Mazurek, Cisco TAC Engineer. Sep 05, 2014 Contents Introduction Prerequisites
More informationConfiguring PortChannels
This chapter provides information about PortChannels and how to configure the PortChannels. Finding Feature Information, page 1 Information About PortChannels, page 1 Prerequisites for PortChannels, page
More informationSwitch Interoperability Guide
IBM FIbre Channel Switch Interoperability GUIDE v2 9 / 03 Fibre Channel IBM BladeCenter Switch Interoperability Guide v2 9/2003 S A N THE ONLY SOURCE FOR MULTI-VENDOR INTEROPERABILITY QLOGIC PRESS QLOGIC
More informationInter-VSAN Routing Configuration
CHAPTER 16 This chapter explains the inter-vsan routing (IVR) feature and provides details on sharing resources across VSANs using IVR management interfaces provided in the switch. This chapter includes
More informationUsing the Cisco NX-OS Setup Utility
This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined
More informationUsing the Cisco NX-OS Setup Utility
This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined
More informationConfiguring FCoE NPV. Information About FCoE NPV. This chapter contains the following sections:
This chapter contains the following sections: Information About FCoE NPV, page 1 FCoE NPV Model, page 3 Mapping Requirements, page 4 Port Requirements, page 5 NPV Features, page 5 vpc Topologies, page
More informationQ&As. Troubleshooting Cisco Data Center Infrastructure. Pass Cisco Exam with 100% Guarantee
300-180Q&As Troubleshooting Cisco Data Center Infrastructure Pass Cisco 300-180 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money
More informationTech Note on Priority Transmit B2B Credits in MDS Switches
Tech Note on Priority Transmit B2B Credits in MDS Switches Contents Introduction Prerequisites Requirements Components Used Understand Priority Transmit B2B Credits in MDS Switch For an Inter-Switch Link
More informationManaging Network Adapters
Managing Network Adapters This chapter includes the following sections: Overview of the Cisco UCS C-Series Network Adapters, page 1 Viewing Network Adapter Properties, page 3 Configuring Network Adapter
More informationMaintenance Tasks CHAPTER
CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-3 Configuring Date and Time Properties,
More informationService Profiles and Templates
Service Profile Templates, page 1 Service Profiles, page 3 Service Profile Templates Service profile templates enable you to quickly create several service profiles with the same basic parameters, such
More informationGetting Started. Enabling SSH
This chapter provides an overview of the basic configurations that need to be completed before getting started with IOA-specific configurations: Enabling SSH, page 1 Enabling CFS, page 2 IP Access Lists,
More informationCisco MDS 9000 Family Blade Switch Solutions Guide
. Solutions Guide Cisco MDS 9000 Family Blade Switch Solutions Guide Introduction This document provides design and configuration guidance for administrators implementing large-scale blade server deployments
More informationIBM Europe Announcement ZG , dated February 13, 2007
IBM Europe Announcement ZG07-0221, dated February 13, 2007 Cisco MDS 9200 for IBM System Storage switches, models 9216i and 9216A, offer enhanced performance, scalability, multiprotocol capabilities, and
More informationConfiguring Interface Buffers
This chapter provides information about interfaces buffers, its features, and how to configure the interface buffers Finding Feature Information, page 1 Information About Interface Buffers, page 1, page
More informationUCS Engineering Details for the SAN Administrator
UCS Engineering Details for the SAN Administrator Craig Ashapa 2 First things first: debunking a myth Today (June 2012 UCS 2.02m) there is no FCoE northbound of UCS unless you really really really want
More informationConfiguring and Managing Zones
Send documentation comments to mdsfeedback-doc@cisco.com CHAPTER 30 Zoning enables you to set up access control between storage devices or user groups. If you have administrator privileges in your fabric,
More informationTroubleshooting Zones and Zone Sets
CHAPTER 14 This chapter describes how to identify and resolve problems that might occur while implementing zones and zone sets on switches in the Cisco MDS 9000 Family. It includes the following sections:
More informationConfiguring Fabric Configuration Server
CHAPTER 12 This chapter describes the Fabric Configuration Server (FCS) feature provided in the Cisco MDS 9000 Family of directors and switches. It includes the following sections: About FCS, page 12-1
More informationFibre Channel Switch Interoperability Guide
SIMPLE LOW COST SANS v4 12 04 IBM BladeCenter Fibre Channel Switch Interoperability Guide QLOGIC PRESS IBM BladeCenter Fibre Channel Switch Interoperability Guide Version 4.0 Copyright IBM Corporation
More informationDirect Attached Storage
, page 1 Fibre Channel Switching Mode, page 1 Configuring Fibre Channel Switching Mode, page 2 Creating a Storage VSAN, page 3 Creating a VSAN for Fibre Channel Zoning, page 4 Configuring a Fibre Channel
More informationConfiguring a Dual Fabric SAN Environment
CHAPTER 10 Dual fabric SAN environments are an important configuration requirement. You can use CSM modules in combination with the Inter-VSAN Routing (IVR) feature to operate across two isolated fabrics.
More informationQ&As. Troubleshooting Cisco Data Center Unified Computing. Pass Cisco Exam with 100% Guarantee
642-035 Q&As Troubleshooting Cisco Data Center Unified Computing Pass Cisco 642-035 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money
More informationConfiguring EtherChannels and Layer 2 Trunk Failover
28 CHAPTER Configuring EtherChannels and Layer 2 Trunk Failover This chapter describes how to configure EtherChannels on Layer 2 ports on the switch. EtherChannel provides fault-tolerant high-speed links
More informationCisco I/O Accelerator Deployment Guide
Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves
More informationUCS deployment guide for Nimble Storage
Summary This article is intended as a how to guide to allow for successful deployment of Nimble Storage iscsi connectivity to Cisco UCS. Nimble Storage / Cisco UCS connectivity checklist: 1) Determine
More informationMaintenance Tasks CHAPTER
CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-4 Configuring Date and Time Properties,
More informationCisco UCS Local Zoning
Configuration Guide Cisco UCS Local Zoning Configuration Guide May 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 30 Contents Overview...
More informationConfiguring Virtual Port Channels
Configuring Virtual Port Channels This chapter describes how to configure virtual port channels (vpcs) on Cisco Nexus 5000 Series switches. It contains the following sections: Information About vpcs, page
More informationFCoE Configuration Between VIC Adapter on UCS Rack Server and Nexus 5500 Switch
FCoE Configuration Between VIC Adapter on UCS Rack Server and Nexus 5500 Switch Document ID: 117280 Contributed by Padmanabhan, Cisco TAC Engineer. Mar 25, 2014 Contents Introduction Prerequisites Requirements
More informationMDS 9000 Core with Brocade 3900/12000 Edge Topology
CHAPTER 6 MDS 9000 Core with Brocade 3900/12000 Edge Topology This chapter describes how to set up a basic core-edge topology with one MDS 9000 switch configured for interop mode 1 at the core and two
More informationConfiguring EtherChannels and Link-State Tracking
CHAPTER 37 Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the switch. EtherChannel provides fault-tolerant high-speed
More informationConfiguring Service Profiles
This chapter includes the following sections: Service Profiles that Override Server Identity, page 1 Service Profiles that Inherit Server Identity, page 2 Guidelines and Recommendations for Service Profiles,
More informationConfiguring SAN Port Channel
Configuring SAN Port Channel This chapter contains the following sections: Configuring SAN Port Channels, page 1 Configuring SAN Port Channels SAN port channels refer to the aggregation of multiple physical
More informationF Commands CHAPTER. Send documentation comments to
CHAPTER 7 The commands in this chapter apply to the Cisco MDS 9000 Family of multilayer directors and fabric switches. All commands are shown here in alphabetical order regardless of command mode. Please
More informationVendor: Cisco. Exam Code: Exam Name: Introducing Cisco Data Center Technologies. Version: Demo
Vendor: Cisco Exam Code: 640-916 Exam Name: Introducing Cisco Data Center Technologies Version: Demo DEMO QUESTION 1 Which two Cisco Nexus 2000-Series Fabric Extenders support connections to both Cisco
More informationCisco Nexus 5000 Series NX-OS SAN Switching Configuration Guide
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-xxxxx-xx THE
More informationMDS 9020 Switch Interoperability
CHAPTER 10 This chapter describes how to connect the Cisco MDS 9020 fabric switch to a third-party switch, and it includes the following sections: Specifications, page 10-5 Expected Topology Behavior,
More informationConfiguring EtherChannels and Layer 2 Trunk Failover
35 CHAPTER Configuring EtherChannels and Layer 2 Trunk Failover This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the switch. EtherChannel provides fault-tolerant high-speed
More informationScheduling Maintenance Jobs
CHAPTER 5 The Cisco MDS command scheduler feature helps you schedule configuration and maintenance jobs in any switch in the Cisco MDS 9000 Family.You can use this feature to schedule jobs on a one-time
More informationC H A P T E R InfiniBand Commands Cisco SFS 7000 Series Product Family Command Reference Guide OL
CHAPTER 4 This chapter documents the following commands: ib sm db-sync, page 4-2 ib pm, page 4-4 ib sm, page 4-9 ib-agent, page 4-13 4-1 ib sm db-sync Chapter 4 ib sm db-sync To synchronize the databases
More informationCisco MDS 9000 Family NX-OS Licensing Guide, Release 6.x
Cisco MDS 9000 Family NX-OS Licensing Guide, Release 6.x Revised: July 10, 2017, OL-29297-02 Licensing Cisco MDS 9000 Series NX-OS Software Features Licenses are available for all switches in the Cisco
More informationMDS 9000 Switch and McData Dual Core Topology (Interop Mode 1)
5 CHAPTER MDS 9000 Switch and McData Dual Core Topology (Interop Mode 1) This chapter describes how to set up a basic dual-core topology with an MDS 9000 switch configured for interop mode 1 and a McData
More informationCisco Nexus 9000 Series NX-OS FC NPV Configuration Guide, Release 9.x
Cisco Nexus 9000 Series NX-OS FC NPV Configuration Guide, Release 9.x First Published: 2018-07-11 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationHS22, HS22v, HX5 Boot from SAN with QLogic on IBM UEFI system.
HS22, HS22v, HX5 Boot from SAN with QLogic on IBM UEFI system. Martin Gingras Product Field Engineer, Canada mgingras@ca.ibm.com Acknowledgements Thank you to the many people who have contributed and reviewed
More informationUCS Direct Attached Storage and FC Zoning Configuration Example
UCS Direct Attached Storage and FC Zoning Configuration Example Document ID: 116082 May 23, 2013 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information UCS
More informationConfiguring and Managing Zones
CHAPTER 5 Zoning enables you to set up access control between storage devices or user groups. If you have administrator privileges in your fabric, you can create zones to increase network security and
More informationFor information about configuring these settings from Cluster Management Suite (CMS), refer to the online help.
Configuring VLANs This chapter provides information about configuring virtual LANs (VLANs). It includes command-line interface (CLI) procedures for using commands that have been specifically created or
More informationvsphere 6.0 with HP ProLiant Gen9 Servers, OneView, 3PAR, Cisco Nexus 5600 and Brocade 6510 Deployment Guide
Technical white paper vsphere 6.0 with HP ProLiant Gen9 Servers, OneView, 3PAR, Cisco Nexus 5600 and Brocade 6510 Deployment Guide Updated: 4/30/2015 Hongjun Ma, HP DCA Table of contents Introduction...
More informationConfiguring Virtual Port Channels
This chapter contains the following sections: Information About vpcs, page 1 Guidelines and Limitations for vpcs, page 10 Configuring vpcs, page 11 Verifying the vpc Configuration, page 25 vpc Default
More informationMaintenance Tasks. About A/B Partition CHAPTER
CHAPTER 4 These topics describe the Chassis Manager maintenance tasks: About A/B Partition, page 4-1 Configuring Basic System Information, page 4-2 Configuring System Global Settings, page 4-4 Configuring
More informationFibre Channel and iscsi Configuration Guide for the Data ONTAP 8.0 Release Family
IBM System Storage N series Fibre Channel and iscsi Configuration Guide for the Data ONTAP 8.0 Release Family GA32-0783-03 Table of Contents 3 Contents Preface... 7 Supported features... 7 Websites...
More informationLarge SAN Design Best Practices Using Cisco MDS 9700 and MDS 9500 Multilayer Directors
White Paper Large SAN Design Best Practices Using Cisco MDS 9700 and MDS 9500 Multilayer Directors What You Will Learn As SANs continue to grow in size, many factors need to be considered to help scale
More informationCisco MDS 9000 Series Fabric Configuration Guide, Release 8.x
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 2018 Cisco Systems, Inc. All rights
More informationConfiguring Port Security
33 CHAPTER This chapter describes how to configure port security on the Catalyst 4500 series switch. It provides an overview of port security on the Catalyst 4500 series switch and details the configuration
More informationTroubleshooting Distributed Device Alias Services
CHAPTER 15 Troubleshooting Distributed Device Alias Services This chapter describes how to troubleshoot and resolve problems that might occur when using device aliases. It includes the following sections:
More informationIBM IBM Storage Networking Solutions Version 1.
IBM 000-740 IBM Storage Networking Solutions Version 1 http://killexams.com/exam-detail/000-740 - disk storage subsystem with four (4) total ports - two (2) LTO3 tape drives to be attached Assuming best
More informationConfiguring Host Router and Cisco Analog Video Gateway Module Interfaces
Configuring Host Router and Cisco Analog Video Gateway Module Interfaces Last Updated: August 17, 2009 To configure the Cisco Analog Video Gateway network module after it is installed in your host Cisco
More informationCisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards First Published: May 17, 2005 Last Updated: July 28, 2010 This document provides configuration tasks for the 4-port Cisco HWIC-4ESW and the 9-port
More informationConfiguring Port-Based Traffic Control
CHAPTER 18 This chapter describes how to configure port-based traffic control features on the Catalyst 3750 Metro switch. For complete syntax and usage information for the commands used in this chapter,
More informationITBraindumps. Latest IT Braindumps study guide
ITBraindumps http://www.itbraindumps.com Latest IT Braindumps study guide Exam : 300-460 Title : Implementing and Troubleshooting the Cisco Cloud Infrastructure Vendor : Cisco Version : DEMO Get Latest
More informationConfiguring Virtual Port Channels
This chapter contains the following sections: Information About vpcs vpc Overview Information About vpcs, on page 1 Guidelines and Limitations for vpcs, on page 11 Verifying the vpc Configuration, on page
More informationManaging Modules. About Modules. Send documentation comments to CHAPTER
CHAPTER 19 This chapter describes how to manage switching and services modules (also known as line cards) and provides information on monitoring module states. This chapter includes the following sections:
More informationDesigning and Deploying a Cisco Unified Computing System SAN Using Cisco MDS 9000 Family Switches
Designing and Deploying a Cisco Unified Computing System SAN Using Cisco MDS 9000 Family Switches What You Will Learn The Cisco Unified Computing System helps address today s business challenges by streamlining
More informationConfiguring TACACS+ About TACACS+
This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,
More informationConfiguring InterVLAN Routing
CHAPTER 2 Configuring InterVLAN Routing This chapter describes how to configure the Multilayer Switch Feature Card (MSFC) for intervlan routing on the Catalyst 6000 family switches and MSFC. Note For more
More informationConfiguring EtherChannels and Link-State Tracking
30 CHAPTER Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels on Layer 2 ports on the Catalyst 2960 switch. EtherChannel provides fault-tolerant high-speed
More informationConfiguring Spanning Tree Protocol
Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25
More informationWith 802.1X port-based authentication, the devices in the network have specific roles.
This chapter contains the following sections: Information About 802.1X, page 1 Licensing Requirements for 802.1X, page 9 Prerequisites for 802.1X, page 9 802.1X Guidelines and Limitations, page 9 Default
More informationExam : E : Networked Storage - SAN Specialist Exam for Storage Administrators. Title. Ver :
Exam : Title : Networked Storage - SAN Specialist Exam for Storage Administrators Ver : 03.30.07 QUESTION 1 On the ControlCenter infrastructure server, Certkiller.com has added two McData DS-32M switches
More informationConfiguring SPAN. Configuring SPAN. SPAN Sources. This chapter includes the following sections: Configuring SPAN, page 1
This chapter includes the following sections:, page 1 SPAN Sources The Switched Port Analyzer (SPAN) feature (sometimes called port mirroring or port monitoring) selects network traffic for analysis by
More informationFibre Channel Specialist Lab
Fibre Channel Specialist Lab 203.21 Enterprise Fabric Suite Zoning Operation Objective: This lab will demonstrate the configuration and management of zoning in a QLogic fabric. Unless noted, all operations
More informationSANsurfer Fibre Channel Command Line Interface (CLI) Table of Contents
SANsurfer Fibre Channel Command Line Interface (CLI) QLogic Corporation All rights reserved Table of Contents 1 Package Contents 2 Requirements 2.1 Hardware Requirements 2.2 Software Requirements 3 OS
More informationSAN Configuration Guide
ONTAP 9 SAN Configuration Guide November 2017 215-11168_G0 doccomments@netapp.com Updated for ONTAP 9.3 Table of Contents 3 Contents Considerations for iscsi configurations... 5 Ways to configure iscsi
More informationConfiguring Port-Based Traffic Control
Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page
More informationCisco MDS 9000 Series Switches
Cisco MDS 9000 Series Switches Overview of Cisco Storage Networking Solutions Cisco MDS 9000 Series Directors Cisco MDS 9718 Cisco MDS 9710 Cisco MDS 9706 Configuration Chassis, dual Supervisor-1E Module,
More informationLab 1. CLI Navigation. Scenario. Initial Configuration for R1
Lab 1 CLI Navigation This lab covers the most basic skills for accessing and using the command-line interface (CLI) on a Cisco router or switch. Many of the small, picky details of how the CLI works cannot
More information