Cisco Mds 9000 NX Os Fabric Configuration Guide 9x
Cisco Mds 9000 NX Os Fabric Configuration Guide 9x
x
First Published: 2022-09-02
Last Modified: 2024-12-06
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2024 Cisco Systems, Inc. All rights reserved.
CONTENTS
Virtual SANs 3
Dynamic Port VSAN Membership 4
SAN Device Virtualization 4
Zoning 4
Distributed Device Alias Services 5
Fibre Channel Routing Services and Protocols 5
Multiprotocol Support 5
VSAN Configuration 11
Reserved VSAN Range and Isolated VSAN Range Guidelines 12
VSAN Creation 12
Creating VSANs Statically 12
Creating VSANs 12
Port VSAN Membership 13
Assigning Static Port VSAN Membership 13
Displaying VSAN Static Membership 14
Default VSAN 15
Isolated VSAN 15
Displaying Isolated VSAN Membership 15
Operational State of a VSAN 16
Static VSAN Deletion 16
Deleting Static VSANs 16
Load Balancing 17
Configuring Load Balancing 17
Interop Mode 18
FICON VSANs 18
Displaying Static VSAN Configuration 19
Default Settings 19
Displaying Fabric Switch Information 20
About DPVM 21
About DPVM Configuration 22
Enabling DPVM 22
DPVM Device Configuration (Static) 23
Configuring DPVM 23
Activating DPVM 24
DPVM Autolearn 25
Enabling Autolearn 25
Clearing Learned Entries 26
Disabling Autolearn 26
DPVM Distribution 27
About DPVM Distribution 27
Disabling DPVM Distribution 27
CHAPTER 8 Managing FLOGI, Name Server, FDMI, and RSCN Databases 205
Audience
To use this installation guide, you need to be familiar with electronic circuitry and wiring practices, and
preferably be an electronic or electromechanical technician.
Document Conventions
This document uses the following conventions:
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or
loss of data.
Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work
on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard
practices for preventing accidents. Use the statement number provided at the end of each warning to locate
its translation in the translated safety warnings that accompanied this device. Statement 1071.
Related Documentation
The documentation set for the Cisco MDS 9000 Series Switches includes the following documents.
Release Notes
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-release-notes-list.html
Regulatory Compliance and Safety Information
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/mds9000/hw/regulatory/compliance/RCSI.html
Compatibility Information
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-device-support-tables-list.html
Installation and Upgrade
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-installation-guides-list.html
Configuration
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-installation-and-configuration-guides-list.html
CLI
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-command-reference-list.html
Troubleshooting and Reference
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
tsd-products-support-troubleshoot-and-alerts.html
To find a document online, use the Cisco MDS NX-OS Documentation Locator at:
http://www.cisco.com/c/en/us/td/docs/storage/san_switches/mds9000/roadmaps/doclocater.html
Virtual SANs
Virtual SAN (VSAN) technology partitions a single physical SAN into multiple VSANs. VSAN capabilities
allow Cisco NX-OS software to logically divide a large physical fabric into separate, isolated environments
to improve Fibre Channel SAN scalability, availability, manageability, and network security. For FICON,
VSANs facilitate hardware-based separation of FICON and open systems.
Each VSAN is a logically and functionally separate SAN with its own set of Fibre Channel fabric services.
This partitioning of fabric services greatly reduces network instability by containing fabric reconfigurations
and error conditions within an individual VSAN. The strict traffic segregation provided by VSANs helps
ensure that the control and data traffic of a specified VSAN are confined within the VSAN’s own domain,
increasing SAN security. VSANs help reduce costs by facilitating consolidation of isolated SAN islands into
a common infrastructure without compromising availability.
Users can create administrator roles that are limited in scope to certain VSANs. For example, a network
administrator role can be set up to allow configuration of all platform-specific capabilities, while other roles
can be set up to allow configuration and management only within specific VSANs. This approach improves
the manageability of large SANs and reduces disruptions due to human error by isolating the effect of a user
action to a specific VSAN whose membership can be assigned based on switch ports or the worldwide name
(WWN) of attached devices.
VSANs are supported across FCIP links between SANs, which extends VSANs to include devices at a remote
location. The Cisco MDS 9000 Family switches also implement trunking for VSANs. Trunking allows
Inter-Switch Links (ISLs) to carry traffic for multiple VSANs on the same physical link.
Note SDV is not supported from Cisco MDS NX-OS Release 4.x and later.
Zoning
Zoning provides access control for devices within a SAN. Cisco NX-OS software supports the following types
of zoning:
• N port zoning—Defines zone members based on the end-device (host and storage) port.
• WWN
• Fibre Channel identifier (FC-ID)
• Fx port zoning—Defines zone members based on the switch port.
• WWN
• WWN plus interface index, or domain ID plus interface index
• Domain ID and port number (for Brocade interoperability)
• iSCSI zoning—Defines zone members based on the host zone.
• iSCSI name
• IP address
• LUN zoning—When combined with N port zoning, LUN zoning helps ensure that LUNs are accessible
only by specific hosts, providing a single point of control for managing heterogeneous storage-subsystem
access.
• Read-only zones—An attribute can be set to restrict I/O operations in any zone type to SCSI read-only
commands. This feature is especially useful for sharing volumes across servers for backup, data
warehousing, etc.
Note LUN zoning and read-only zones are not supported from Cisco MDS NX-OS Release 5.x and later.
• Broadcast zones—An attribute can be set for any zone type to restrict broadcast frames to members of
the specific zone.
To provide strict network security, zoning is always enforced per frame using access control lists (ACLs) that
are applied at the ingress switch. All zoning polices are enforced in hardware, and none of them cause
performance degradation. Enhanced zoning session-management capabilities further enhance security by
allowing only one user at a time to modify zones.
Multiprotocol Support
In addition to supporting Fibre Channel Protocol (FCP), Cisco NX-OS software supports IBM Fibre Connection
(FICON), Small Computer System Interface over IP (iSCSI), and Fibre Channel over IP (FCIP) in a single
platform. Native iSCSI support in the Cisco MDS 9000 Family switches helps customers consolidate storage
for a wide range of servers into a common pool on the SAN.
About VSANs
A VSAN is a virtual storage area network (SAN). A SAN is a dedicated network that interconnects hosts and
storage devices primarily to exchange SCSI traffic. In SANs, you use the physical links to make these
interconnections. A set of protocols run over the SAN to handle routing, naming, and zoning. You can design
multiple SANs with different topologies.
With the introduction of VSANs, the network administrator can build a single topology containing switches,
links, and one or more VSANs. Each VSAN in this topology has the same behavior and property of a SAN.
A VSAN has the following additional features:
• Multiple VSANs can share the same physical topology.
• The same Fibre Channel IDs (FC IDs) can be assigned to a host in another VSAN, thus increasing VSAN
scalability.
• Every instance of a VSAN runs all required protocols such as FSPF, domain manager, and zoning.
• Fabric-related configurations in one VSAN do not affect the associated traffic in another VSAN.
• Events causing traffic disruptions in one VSAN are contained within that VSAN and are not propagated
to other VSANs.
This section describes VSANs and includes the following topics:
VSANs Topologies
The switch icons shown in both Figure 1: Logical VSAN Segmentation, on page 8 and Figure 2: Example
of Two VSANs, on page 9 indicate that these features apply to any switch in the Cisco MDS 9000 Family.
Figure 1: Logical VSAN Segmentation, on page 8 shows a fabric with three switches, one on each floor.
The geographic location of the switches and the attached devices is independent of their segmentation into
logical VSANs. No communication between VSANs is possible. Within each VSAN, all members can talk
to one another.
Figure 1: Logical VSAN Segmentation
Figure 2: Example of Two VSANs, on page 9 shows a physical Fibre Channel switching infrastructure with
two defined VSANs: VSAN 2 (dashed) and VSAN 7 (solid). VSAN 2 includes hosts H1 and H2, application
servers AS2 and AS3, and storage arrays SA1 and SA4. VSAN 7 connects H3, AS1, SA2, and SA3.
The four switches in this network are interconnected by trunk links that carry both VSAN 2 and VSAN 7
traffic. The inter-switch topology of both VSAN 2 and VSAN 7 are identical. This is not a requirement and
a network administrator can enable certain VSANs on certain links to create different VSAN topologies.
Without VSANs, a network administrator would need separate switches and links for separate SANs. By
enabling VSANs, the same switches and links may be shared by multiple VSANs. VSANs allow SANs to be
built on port granularity instead of switch granularity. Figure 2: Example of Two VSANs, on page 9 illustrates
that a VSAN is a group of hosts or storage devices that communicate with each other using a virtual topology
defined on the physical SAN.
The criteria for creating such groups differ based on the VSAN topology:
• VSANs can separate traffic based on the following requirements:
• Different customers in storage provider data centers
• Production or test in an enterprise network
• Low and high security requirements
• Backup traffic on separate VSANs
• Replicating data from user traffic
VSAN Advantages
VSANs offer the following advantages:
• Traffic isolation—Traffic is contained within VSAN boundaries and devices reside only in one VSAN
ensuring absolute separation between user groups, if desired.
• Scalability—VSANs are overlaid on top of a single physical fabric. The ability to create several logical
VSAN layers increases the scalability of the SAN.
• Per VSAN fabric services—Replication of fabric services on a per VSAN basis provides increased
scalability and availability.
• Redundancy—Several VSANs created on the same physical SAN ensure redundancy. If one VSAN fails,
redundant protection (to another VSAN in the same physical SAN) is configured using a backup path
between the host and the device.
• Ease of configuration—Users can be added, moved, or changed between VSANs without changing the
physical structure of a SAN. Moving a device from one VSAN to another only requires configuration at
the port level, not at a physical level.
Up to 256 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and another is
an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
VSANs equal SANs with routing, naming, and zoning protocols. Routing, naming, and zoning protocols are not available on a
per-zone basis.
VSANs limit unicast, multicast, and broadcast traffic. Zones limit unicast traffic.
Membership is typically defined using the VSAN ID to Fx ports. Membership is typically defined by the pWWN.
An HBA or a storage device can belong only to a single An HBA or storage device can belong to multiple zones.
VSAN—the VSAN associated with the Fx port.
VSANs enforce membership at each E port, source port, and Zones enforce membership only at the source and destination
destination port. ports.
VSANs are defined for larger environments (storage service Zones are defined for a set of initiators and targets not visible
providers). outside the zone.
VSANs encompass the entire fabric. Zones are configured at the fabric edge.
Figure 3: VSANS with Zoning, on page 11 shows the possible relationships between VSANs and zones. In
VSAN 2, three zones are defined: zone A, zone B, and zone C. Zone C overlaps both zone A and zone B as
permitted by Fibre Channel standards. In VSAN 7, two zones are defined: zone A and zone D. No zone crosses
the VSAN boundary—they are completely contained within the VSAN. Zone A defined in VSAN 2 is different
and separate from zone A defined in VSAN 7.
VSAN Configuration
VSANs have the following attributes:
• VSAN ID—The VSAN ID identifies the VSAN as the default VSAN (VSAN 1), user-defined VSANs
(VSAN 2 to 4093), and the isolated VSAN (VSAN 4094).
• State—The administrative state of a VSAN can be configured to an active (default) or suspended state.
Once VSANs are created, they may exist in various conditions or states.
• The active state of a VSAN indicates that the VSAN is configured and enabled. By enabling a
VSAN, you activate the services for that VSAN.
• The suspended state of a VSAN indicates that the VSAN is configured but not enabled. If a port is
configured in this VSAN, it is disabled. Use this state to deactivate a VSAN without losing the
VSAN’s configuration. All ports in a suspended VSAN are disabled. By suspending a VSAN, you
can preconfigure all the VSAN parameters for the whole fabric and activate the VSAN immediately.
• VSAN name—This text string identifies the VSAN for management purposes. The name can be from 1
to 32 characters long and it must be unique across all VSANs. By default, the VSAN name is a
concatenation of VSAN and a four-digit string representing the VSAN ID. For example, the default name
for VSAN 3 is VSAN0003.
• Load balancing attributes—These attributes indicate the use of the source-destination ID (src-dst-id) or
the originator exchange OX ID (src-dst-ox-id, the default) for load balancing path selection.
Note OX ID based load balancing of IVR traffic from IVR- enabled switches is not supported on Generation 1
switching modules. OX ID based load balancing of IVR traffic from a non-IVR MDS switch should work.
Generation 2 switching modules support OX ID based load balancing of IVR traffic from IVR-enabled
switches.
This section describes how to create and configure VSANs and includes the following topics:
VSAN Creation
A VSAN is in the operational state if the VSAN is active and at least one port is up. This state indicates that
traffic can pass through this VSAN. This state cannot be configured.
Creating VSANs
To create VSANs, follow these steps:
Procedure
updated vsan 2
Updates the VSAN with the assigned name (TechDoc).
Trunking ports have an associated list of VSANs that are part of an allowed list ( refer to the Cisco MDS 9000
Family NX-OS Interfaces Configuration Guide ).
Procedure
Note Interface information is not displayed if interfaces are not configured on this VSAN.
vsan 1 interfaces:
fc2/16 fc2/15 fc2/14 fc2/13 fc2/12 fc2/11 fc2/10 fc2/9
fc2/8 fc2/7 fc2/6 fc2/5 fc2/4 fc2/3 fc2/2 fc2/1
fc1/16 fc1/15 fc1/14 fc1/13 fc1/12 fc1/11 fc1/10 fc1/9
fc1/7 fc1/6 fc1/5 fc1/4 fc1/3 fc1/2 fc1/1
vsan 2 interfaces:
fc1/8
vsan 7 interfaces:
vsan 100 interfaces:
vsan 4094(isolated vsan) interfaces:
Default VSAN
The factory settings for switches in the Cisco MDS 9000 Family have only the default VSAN 1 enabled. We
recommend that you do not use VSAN 1 as your production environment VSAN. If no VSANs are configured,
all devices in the fabric are considered part of the default VSAN. By default, all ports are assigned to the
default VSAN.
Note Up to 256 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and another is
an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
Isolated VSAN
VSAN 4094 is an isolated VSAN. All non-trunking ports are transferred to this VSAN when the VSAN to
which they belong is deleted. This avoids an implicit transfer of ports to the default VSAN or to another
configured VSAN. All ports in the deleted VSAN are isolated (disabled).
Note When you configure a port in VSAN 4094 or move a port to VSAN 4094, that port is immediately isolated.
Note Up to 256 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and another is
an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
• VSAN-based runtime (name server), zoning, and configuration (static routes) information is removed
when the VSAN is deleted.
• Configured VSAN interface information is removed when the VSAN is deleted.
Note The allowed VSAN list is not affected when a VSAN is deleted (refer to the Cisco MDS 9000 Family NX-OS
Interfaces Configuration Guide ).
Any commands for a nonconfigured VSAN are rejected. For example, if VSAN 10 is not configured in the
system, then a command request to move a port to VSAN 10 is rejected.
Procedure
Load Balancing
Load balancing attributes indicate the use of the source-destination ID (src-dst-id) or the originator exchange
OX ID (src-dst-ox-id, the default) for load balancing path selection.
Note For FICON supported switches, load balancing can either be done as a very small disruption producing errors
for open exchanges at the time of the change or if the change is required to be 100% disruptive, then either
the ISLs can be taken down or the traffic crossing the ISLs can be quiesced.
Procedure
Interop Mode
Interoperability enables the products of multiple vendors to come into contact with each other. Fibre Channel
standards guide vendors towards common external Fibre Channel interfaces. See the Switch Interoperability,
on page 288.
FICON VSANs
You can enable FICON in up to eight VSANs. See the FICON VSAN Prerequisites, on page 237.
Default Settings
Table 2: Default VSAN Parameters , on page 20 lists the default settings for all configured VSANs.
Parameters Default
Name Concatenation of VSAN and a four-digit string representing the VSAN ID. For
example, VSAN 3 is VSAN0003.
Note This command is not supported prior to Cisco NX-OS Release 6.2(7).
Note SUP memory is not displayed for the switches that are running Cisco NX-OS Release prior to 6.2(7).
Note Without the VSAN option, this command displays information about switches in all the VSANs.
About DPVM
Port VSAN membership on the switch is assigned on a port-by-port basis. By default each port belongs to
the default VSAN.
You can dynamically assign VSAN membership to ports by assigning VSANs based on the device WWN.
This method is referred to as Dynamic Port VSAN Membership (DPVM). DPVM offers flexibility and
eliminates the need to reconfigure the port VSAN membership to maintain fabric topology when a host or
storage device connection is moved between two Cisco MDS switches or two ports within a switch. It retains
the configured VSAN regardless of where a device is connected or moved. To assign VSANs statically, see
Creating Dynamic VSANs, on page 21 .
DPVM configurations are based on port world wide name (pWWN) and node world wide name (nWWN)
assignments. DPVM contains mapping information for each device pWWN/nWWN assignment and the
corresponding VSAN. The Cisco NX-OS software checks DPVM active configuration during a device FLOGI
and obtains the required VSAN details.
The pWWN identifies the host or device and the nWWN identifies a node consisting of multiple devices. You
can assign any one of these identifiers or any combination of these identifiers to configure DPVM mapping.
If you assign a combination, then preference is given to the pWWN.
DPVM uses the Cisco Fabric Services (CFS) infrastructure to allow efficient database management and
distribution. DPVM uses the application driven, coordinated distribution mode and the fabric-wide distribution
scope (for information about CFS, refer to the Cisco MDS 9000 Series NX-OS System Management
Configuration Guide .
Note DPVM does not cause any changes to device addressing. DPVM only pertains to the VSAN membership of
the device, ensuring that the host gets the same VSAN membership on any port on the switch. For example,
if a port on the switch has a hardware failure, you can move the host connection to another port on the switch
and you do not need to update the VSAN membership manually.
Note The DPVM feature overrides any existing static port VSAN membership configuration. If the VSAN
corresponding to the dynamic port is deleted or suspended, the port is shut down.
Enabling DPVM
To begin configuring DPVM, you must explicitly enable DPVM on the required switches in the fabric. By
default, this feature is disabled in all switches in the Cisco MDS 9000 Family.
The configuration and verification commands for DPVM are only available when DPVM is enabled on a
switch. When you disable this feature, all related configurations are automatically discarded.
To enable DPVM on any participating switch, follow these steps:
Procedure
Configuring DPVM
To configure DPVM, follow these steps:
Procedure
(Optional) Removes the specified device nWWN mapping from the DPVM config database.
Activating DPVM
Activating DPVM enforces the DPVM configuration. Activation may fail if there are conflicts between the
already active configuration and the configuration to be activated. Activation can be forced to override the
conflicting entries.
DPVM configuration can also be deactivated by issuing the no dpvm activate command.
To activate DPVM, follow these steps:
Procedure
When DPVM distribute is enabled (enabled by default when the feature is enabled) this command is required to commit
the configuration changes.
DPVM Autolearn
DPVM can be configured to automatically learn (autolearn) new devices within each VSAN. DPVM autolearn
can be enabled or disabled at any time. Learned entries are created by populating device pWWNs and VSANs
and can be using the show dpvm database active. DPVM should be activated before autolearn can be enabled.
Auto learned entries can also be manually deleted. The auto learned entries become permanent when DPVM
auto learn is disabled.
Note Autolearn is only supported for devices connected to F ports. Devices connected to FL ports are not entered
into the DPVM database because DPVM is not supported on FL ports.
Enabling Autolearn
To enable autolearn, follow these steps:
Procedure
• To clear all autolearn entries, use the clear dpvm auto-learn command.
Note These two commands do not start a session and can only be issued in the local switch.
Disabling Autolearn
To disable autolearn, follow these steps:
Procedure
Running the no dpvm auto-learn command on other switches in the fabric before running the dpvm commit command
helps to overcome the learnt conflict.
DPVM Distribution
If the DPVM configuration is available on all switches in the fabric, devices can be moved anywhere and
offer the greatest flexibility. To enable database distribution to the neighboring switches, the database should
be consistently administered and distributed across all switches in the fabric. The Cisco NX-OS software uses
the Cisco Fabric Services (CFS) infrastructure to achieve this requirement (refer to the Cisco MDS 9000
NX-OS System Management Configuration Guide ).
This section describes how to distribute DPVM and includes the following topics:
These changes are distributed to all switches in a fabric with the dpvm commit command. Changes can also
discard via the dvpm abort command.
Tip Temporary changes made can be viewed by the show dpvm pending or show dovm pending-diff commands.
Procedure
Procedure
Committing Changes
The dpvm commit command commits all the configuration changes made thus far on the local switch and
also distributes the configurations to other switches in the fabric. On a successful commit, the configuration
change is applied throughout the fabric and the lock is released.
To commit the DPVM configuration changes, follow these steps:
Procedure
Discarding Changes
The dpvm abort discards all the temporary DPVM changes made thus far. The configurations remain unaffected
and the lock is released.
To discard the DPVM configuration changes, follow these steps:
Procedure
Tip Changes made to DPVM when distribution is enabled and held temporarily until the configuration changes
are either committed or discarded. The configuration changes are discarded when the switch is restarted.
To use administrative privileges and release a locked DPVM session, use the clear dpvm session command
in EXEC mode.
Caution If these conditions are not met, the merge will fail. The next distribution will forcefully synchronize the
configurations and the activation states in the fabric.
This section describes how to merge DPVM configurations and includes the following topics:
• Use the dpvm database diff config command to compare the static DPVM configuration with the active
DPVM configuration.
• Use the show dpvm pending-diff command (when CFS distribution is enabled) to compare the pending
DPVM configuration changes.
Command Purpose
switch(config)#
--------------------------------------------------------------------------
Conflicting DPVM member(s) Loc VSAN Rem VSAN
--------------------------------------------------------------------------
dev-alias dpvm_dev_alias_1 [21:00:00:04:cf:cf:45:ba] 1313 1414
dev-alias dpvm_dev_alias_2 [21:00:00:04:cf:cf:45:bb] 1313 1414
dev-alias dpvm_dev_alias_3 [21:00:00:04:cf:cf:45:bc] 1313 1414
[Total 3 conflict(s)]
rbadri-excal13#
Displays the DPVM Current Dynamic Ports for the Specified VSAN
Procedure
At this stage, the configuration does not have an active DPVM configuration and the auto-learn option is disabled.
Step 2 Activate a null (empty) configuration so that it can be populated with autolearned entries.
Example:
At this stage, the database is successfully activated and the auto-learn option continues to be disabled.
Step 3 Enable the auto-learn option and commit the configuration changes.
Example:
At this stage, the currently logged in devices (and their current VSAN assignment) populate the active DPVM configuration.
However the entries are not yet permanent in the active DPVM configuration.
The output of the show dpvm ports and the show flogi database commands displays two other devices that have logged
in (referred to as switch9 and switch3 in this sample configuration).
At this stage, the autolearned entries are made permanent in the active DPVM configuration.
Note
These basic steps help you determine that the information is identical in all the switches in the fabric.
You have now configured a basic DPVM scenario in a Cisco MDS 9000 Series switch.
Default Settings
Table 3: Default DPVM Parameters , on page 35 lists the default settings for DPVM parameters.
Parameters Default
DPVM Disabled.
Parameters Default
Autolearn Disabled.
About Zoning
Zoning has the following features:
• A zone consists of multiple zone members.
• Members in a zone can access each other; members in different zones cannot access each other.
• If zoning is not activated, all devices are members of the default zone.
• If zoning is activated, any device that is not in an active zone (a zone that is part of an active zoneset)
is a member of the default zone.
• Zones can vary in size.
• Devices can belong to more than one zone.
• Zone changes can be configured nondisruptively. New zones and zone sets can be activated without
interrupting traffic on unaffected ports or devices.
• Zone membership criteria is based mainly on WWNs or FC IDs.
• Port world wide name (pWWN)—Specifies the pWWN of an N port attached to the switch as a
member of the zone.
• Fabric pWWN—Specifies the WWN of the fabric port (switch port’s WWN). This membership is
also referred to as port-based zoning.
• FC ID—Specifies the FC ID of an N port attached to the switch as a member of the zone.
• Interface and switch WWN (sWWN)—Specifies the interface of a switch identified by the sWWN.
This membership is also referred to as interface-based zoning.
• Interface and domain ID—Specifies the interface of a switch identified by the domain ID.
• Domain ID and port number—Specifies the domain ID of an MDS domain and additionally specifies
a port belonging to a non-Cisco switch.
• IPv4 address—Specifies the IPv4 address (and optionally the subnet mask) of an attached device.
• IPv6 address—The IPv6 address of an attached device in 128 bits in colon(:)-separated hexadecimal
format.
• Symbolic-nodename—Specifies the member symbolic node name. The maximum length is 240
characters.
• Default zone membership includes all ports or WWNs that do not have a specific membership association.
Access between default zone members is controlled by the default zone policy.
Note For configuration limits on configuring the number of zones, zone members and zone sets, refer to the Cisco
MDS NX-OS Configuration Limits.
Zoning Example
Figure 5: Fabric with Two Zones , on page 39 illustrates a zoneset with two zones, zone 1 and zone 2, in a
fabric. Zone 1 provides access from all three hosts (H1, H2, H3) to the data residing on storage systems S1
and S2. Zone 2 restricts the data on S3 to access only by H3. Note that H3 resides in both zones.
Figure 5: Fabric with Two Zones
There are other ways to partition this fabric into zones. Figure 6: Fabric with Three Zones , on page 39
illustrates another possibility. Assume that there is a need to isolate storage system S2 for the purpose of
testing new software. To achieve this, zone 3 is configured, which contains only host H2 and storage S2. You
can restrict access to just H2 and S2 in zone 3, and to H1 and S1 in zone 1.
Figure 6: Fabric with Three Zones
Zone Implementation
All switches in the Cisco MDS 9000 Series automatically support the following basic zone features (no
additional configuration is required):
• Zones are contained in a VSAN.
• Hard zoning cannot be disabled.
• Name server queries are soft-zoned.
• Only active zone sets are distributed.
• Unzoned devices cannot access each other.
• A zone or zoneset with the same name can exist in each VSAN.
• Each VSAN has a full database and an active database.
• Active zone sets cannot be changed, without activating a full zone database.
• Active zone sets are preserved across switch reboots.
• Changes to the full database must be explicitly saved.
• Zone reactivation (a zoneset is active and you activate another zoneset) does not disrupt existing traffic.
If required, you can additionally configure the following zone features:
• Propagate full zone sets to all switches on a per VSAN basis.
• Change the default policy for unzoned members.
• Interoperate with other vendors by configuring a VSAN in the interop mode. You can also configure one
VSAN in the interop mode and another VSAN in the basic mode in the same switch without disrupting
each other.
• Bring E ports out of isolation.
• When you create a zoneset, that zoneset becomes a part of the full zoneset.
• When you activate a zoneset, a copy of the zoneset from the full zoneset is used to enforce zoning, and
is called the active zoneset. An active zoneset cannot be modified. A zone that is part of an active zoneset
is called an active zone.
• The administrator can modify the full zoneset even if a zoneset with the same name is active. However,
the modification will be enforced only upon reactivation.
• When the activation is done, the active zoneset is automatically stored in persistent configuration. This
enables the switch to preserve the active zoneset information across switch resets.
• All other switches in the fabric receive the active zoneset so they can enforce zoning in their respective
switches.
• Hard and soft zoning are implemented using the active zoneset. Modifications take effect during zoneset
activation.
• An FC ID or Nx port that is not part of the active zoneset belongs to the default zone and the default
zone information is not distributed to other switches.
Note If one zoneset is active and you activate another zoneset, the currently active zoneset is automatically
deactivated. You do not need to explicitly deactivate the currently active zoneset before activating a new
zoneset.
Note The Quick Config Wizard supports only switch interface zone members.
As of Cisco SAN-OS Release 3.1(1) and NX-OS Release 4.1(2), you can use the Quick Config Wizard on
the Cisco MDS 9124 Switch to add or remove zone members per VSAN. You can use the Quick Config
Wizard to perform interface-based zoning and to assign zone members for multiple VSANs using Device
Manager.
Note The Quick Config Wizard is supported on Cisco MDS 9124, MDS 9134, MDS 9132T, MDS 9148, MDS
9148S, MDS 9148T, MDS 9396S, and MDS 9396T fabric switches, the Cisco Fabric Switch for HP c-Class
BladeSystem, and the Cisco Fabric Switch for IBM BladeCenter.
Caution The Quick Config Wizard can only be used on stand-alone switches that do not have any existing zoning
defined on the switch.
To add or remove ports from a zone and to zone only the devices within a specific VSAN using Device
Manager on the Cisco MDS 9124 Switch, follow these steps:
Procedure
Step 1 Choose FC > Quick Config or click the Zone icon in the toolbar.
You see the Quick Config Wizard (see Figure 9: Quick Config Wizard, on page 44) with all controls disabled and the
Discrepancies dialog box (see Figure 8: Discrepancies Dialog Box, on page 43), which shows all unsupported
configurations.
Note
You will see the Discrepancies dialog box only if there are any discrepancies.
Step 3 Check the check box in the Ports Zoned To column for the port you want to add or remove from a zone. The check box
for the matching port is similarly set. The selected port pair is added or removed from the zone, creating a two-device
zone.
The VSAN drop-down menu provides a filter that enables you to zone only those devices within a selected VSAN.
Step 6 If you want to see the CLI commands, right-click in the dialog box and click CLI Commands from the pop-up menu.
Step 7 Click Finish to save the configuration changes.
Zone Configuration
About the Edit Local Full Zone Database Tool
Use the Edit Full Zone Database tool to complete the following tasks:
• Displays the information by VSAN, by using the down-down menu without having to get out of the
window, selecting a VSAN, and re-entering.
• Move devices up or down by alias or by zone, using the Add to zone or alias button.
• Add zoning characteristics based on the alias in different folders.
• Rename zone sets, zones, or aliases.
The Edit Local Full Zone Database tool allows you to zone across multiple switches and all zoning features
are available through the Edit Local Full Zone Database dialog box (see Figure 11: Edit Local Full Zone
Database Dialog Box, on page 46).
1You can display information by VSAN by using the 3You can add zoning characteristics based on
drop-down menu without closing the dialog box, selecting alias in different folders.
a VSAN, and re-entering.
2You can use the Add to zone button to move devices up 4You can triple-click to rename zone sets,
or down by alias or by zone. zones, or aliases in the tree.
Note The Device Alias radio button is visible only if device alias is in enhanced mode. For more information, see
Creating Device Aliases, on page 151 section.
Configuring a Zone
Tip Use a relevant display command (for example, show interface or show flogi database) to obtain the required
value in hex format.
Tip Use the show wwn switch command to retrieve the sWWN. If you do not provide a sWWN, the software
automatically uses the local sWWN.
Tip Expand Switches from the Physical Attributes pane to retrieve the sWWN. If you do not provide a sWWN,
the software automatically uses the local sWWN.
Note Interface-based zoning only works with Cisco MDS 9000 Series switches. Interface-based zoning does not
work if interop mode is configured in that VSAN.
When the number of zones configured has exceeded the maximum number of zones allowed across all VSANs,
this message is displayed:
Note For configuration limits on configuring the number of zones, zone members and zone sets, refer to the Cisco
MDS NX-OS Configuration Limits.
Procedure
switch(config-zone)#
pWWN example:
Example:
Example:
FC ID example:
Example:
FC alias example:
Example:
Domain ID example:
Example:
Example:
Example:
Example:
Example:
Example:
Configures a member for the specified zone (Zone1) based on the type (pWWN, fabric pWWN, FC ID, fcalias, domain
ID, IPv4 address, IPv6 address, or interface) and value specified.
Caution
You must only configure pWWN-type zoning on all MDS switches running Cisco SAN-OS if there is a Cisco MDS 9020
switch running FabricWare in the same fabric.
Note
The Cisco MDS 9396S switch has 96 ports and the other Cisco MDS switches have lower ranges. Therefore while
configuring a zone member based on interface type always select a fabric switch which potentially has the highest interface
count in the fabric.
Procedure
Step 1 Click the Zone icon in the toolbar (see Figure 12: Zone Icon, on page 49).
Figure 12: Zone Icon
Step 2 Select the VSAN where you want to create a zone and click OK.
switch(config)# callhome
You see the Edit Local Full Zone Database dialog box (see Figure 13: Edit Local Full Zone Database Dialog Box, on
page 50).
If you want to view zone membership information, right-click in the All Zone Membership(s) column, and then click
Show Details for the current row or all rows from the pop-up menu.
Step 3 Click Zones in the left pane and click the Insert icon to create a zone.
You see the Create Zone dialog box (see Figure 14: Create Zone Dialog Box, on page 50).
Figure 14: Create Zone Dialog Box
Step 7 Click Zoneset in the left pane and click the Insert icon to create a zone set.
You see the Zoneset Name dialog box (see Figure 15: Zoneset Name Dialog Box, on page 51).
Figure 15: Zoneset Name Dialog Box
Step 9 Select the zone set where you want to add a zone and click the Insert icon or you can drag and drop Zone3 over
Zoneset1.
You see the Select Zone dialog box (see Figure 16: Select Zone Dialog Box, on page 51).
Figure 16: Select Zone Dialog Box
Procedure
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Figure 17: Edit Local Full Zone Database Dialog Box
Step 3 Select the members you want to add from the Fabric pane (see Figure 17: Edit Local Full Zone Database Dialog Box, on
page 52) and click Add to Zone or click the zone where you want to add members and click the Insert icon.
You see the Add Member to Zone dialog box (see Figure 18: Add Member to Zone Dialog Box, on page 52).
Figure 18: Add Member to Zone Dialog Box
Note
The Device Alias radio button is visible only if device alias is in enhanced mode. For more information, see Creating
Device Aliases section.
Step 4 Click the browse button and select a port name or check the LUN check box and click the browse button to configure
LUNs.
Procedure
Step 1 Click the Zone icon in the toolbar (see Figure 12: Zone Icon, on page 49).
Step 2 Select Name, WWN or FC ID from the With drop-down list.
Step 3 Enter a filter condition, such as *zo1*, in the Filter text box.
Step 4 Click Go.
Procedure
Step 1 Click the Zone icon in the toolbar (see Figure 12: Zone Icon, on page 49).
Step 2 Use the Ctrl key to select multiple end devices.
Step 3 Right-click and then select Add to Zone.
Step 4 Use the Ctrl key to select multiple zones from the pop-up window displayed.
Step 5 Click Add.
Selected end devices are added to the selected zones.
Zoneset Distribution—You can distribute full zone sets using one of two methods: one-time distribution or
full zoneset distribution.
Zoneset Duplication—You can make a copy of a zoneset and then edit it without altering the original zoneset.
You can copy an active zoneset from the bootflash: directory, volatile: directory, or slot0, to one of the
following areas:
• To the full zoneset
• To a remote location (using FTP, SCP, SFTP, or TFTP)
The active zoneset is not part of the full zoneset. You cannot make changes to an existing zoneset and activate
it, if the full zoneset is lost or is not propagated.
ZoneSet Creation
In the figure, two separate sets are created, each with its own membership hierarchy and zone members.
Figure 19: Hierarchy of ZoneSets, Zones, and Zone Members
Tip Zonesets are configured with the names of the member zones and the VSAN (if the zoneset is in a configured
VSAN).
Activating a Zoneset
Changes to a zoneset do not take effect in a full zoneset until you activate it.
Tip You do not have to issue the copy running-config startup-config command to store the active zoneset.
However, you need to issue the copy running-config startup-config command to explicitly store full zone
sets. If there is more than one switch in a fabric, the copy running-config startup-config fabric command
should be issued. The fabric keyword causes the copy running-config startup-config command to be issued
on all the switches in the fabric, and also saves the full zone information to the startup-config on all the switches
in the fabric. This is important in the event of a switch reload or power cycle.
Procedure
switch(config)#
WARNING: You are trying to activate zoneset2, which is different from current active zoneset1. Do
you want to continue? (y/n) [n] y
Procedure
Step 6 Check the Save Running to Startup Configuration check box to save all changes to the startup configuration.
Step 7 Click Continue Activation to activate the zone set, or click Cancel to close the dialog box and discard any unsaved
changes.
You see the Zone Log dialog box, which shows if the zone set activation was successful (see Figure 23: Zone Log Dialog
Box, on page 57).
Figure 23: Zone Log Dialog Box
Deactivating a Zoneset
To deactivate an existing zone set, follow these steps:
Procedure
Step 1 Right-click the zone set you want to deactivate and then click Deactivate from the pop-up menu.
You see the Deactivate Zoneset dialog box.
Step 2 Enter deactivate in the text box and then click OK.
You see the Input dialog box.
Step 3 Enter deactivate in the text box and then click OK to deactivate the zone set.
Note
To enable this option, you need to modify the server.properties file.
Procedure
Step 3 Click Zones in the left pane. The right pane lists the members for each zone.
Note
The default zone members are explicitly listed only when the default zone policy is configured as permit. When the
default zone policy is configured as deny, the members of this zone are not shown. See the Displaying Zone Information,
on page 94.
Tip
You do not have to issue the copy running-config startup-config command to store the active zoneset. However, you
need to issue the copy running-config startup-config command to explicitly store full zone sets. If there is more than
one switch in a fabric, the copy running-config startup-config fabric command should be issued. The fabric keyword
causes the copy running-config startup-config command to be issued on all the switches in the fabric, and also saves
the full zone information to the startup-config on all the switches in the fabric. This is important in the event of a switch
reload or power cycle.
Note Even when the zoneset overwrite-control vsan id command is enabled, the user can override it and continue
with the activation of a new zoneset using the zoneset activate name zoneset name vsan vsan -id force command.
Procedure
switch(config)#
WARNING: This will enable Activation Overwrite control. Do you want to continue?
(y/n) [n]
Note
The zoneset overwrite-control vsan id command can be enabled only in enhanced zone mode.
What to do next
Displaying Zone Status
Default Zone
Each member of a fabric (in effect a device attached to an Nx port) can belong to any zone. If a member is
not part of any active zone, it is considered to be part of the default zone. Therefore, if no zoneset is active in
the fabric, all devices are considered to be in the default zone. Even though a member can belong to multiple
zones, a member that is part of the default zone cannot be part of any other zone. The switch determines
whether a port is a member of the default zone when the attached port comes up.
Note Unlike configured zones, default zone information is not distributed to the other switches in the fabric.
Traffic can either be permitted or denied among members of the default zone. This information is not distributed
to all switches; it must be configured in each switch.
Note When the switch is initialized for the first time, no zones are configured and all members are considered to
be part of the default zone. Members are not permitted to talk to each other.
Configure the default zone policy on each switch in the fabric. If you change the default zone policy on one
switch in a fabric, be sure to change it on all the other switches in the fabric.
Note The default settings for default zone configurations can be changed.
The default zone members are explicitly listed when the default policy is configured as permit or when a
zoneset is active. When the default policy is configured as deny, the members of this zone are not explicitly
enumerated when you issue the show zoneset active command.
Note The current default zoning policy is deny. The hidden active zoneset is d__efault__cfg in MDS. When there
is a mismatch in default-zoning policies between two switches (permit on one side and deny on the other),
zone merge will fail. The behavior is the same between two Brocade switches as well. The error messages
will be as shown below.
switch(config-if)# 2014 Sep 2 06:33:21 hac15 %ZONE-2-ZS_MERGE_FAILED: %$VSAN 1%$ Zone merge
failure, isolating interface fc2/10 received reason: Default zoning policy conflict. Received rjt from adjacent
switch:[reason:0]
Switch2 syslog:
switch(config-if)# 2014 Sep 2 12:13:17 hac16 %ZONE-2-ZS_MERGE_FAILED: %$VSAN 1%$ Zone merge
failure, isolating interface fc3/10 reason: Default zoning policy conflict.:[reason:0]
You can change the default zone policy for any VSAN by choosing VSANxx > Default Zone from the DCNM
SAN Client menu tree and clicking the Policies tab. It is recommended that you establish connectivity among
devices by assigning them to a non-default zone.
Procedure
Configuring the Default Zone Access Permission Using DCNM SAN Client
To permit or deny traffic to members in the default zone using DCNM SAN Client, follow these steps:
Procedure
Step 1 Expand a VSAN and then select Default Zone in the DCNM SAN Client Logical Domains pane.
Step 2 Click the Policies tab in the Information pane.
You see the zone policies information in the Information pane (see Figure 24: Default Zone Policies, on page 62).
The active zone set is shown in italic type. After you make changes to the active zone set and before you activate the
changes, the zone set is shown in boldface italic type.
Step 3 In the Default Zone Behaviour field, choose either permit or deny from the drop-down menu.
You can assign an FC alias name and configure an FC alias member using the following values:
• pWWN—The WWN of the N or NL port is in hex format (for example, 10:00:00:23:45:67:89:ab).
• fWWN—The WWN of the fabric port name is in hex format (for example, 10:00:00:23:45:67:89:ab).
• FC ID—The N port ID is in 0xhhhhhh format (for example, 0xce00d1).
• Domain ID—The domain ID is an integer from 1 to 239. A mandatory port number of a non-Cisco switch
is required to complete this membership configuration.
• IPv4 address—The IPv4 address of an attached device is in 32 bits in dotted decimal format along with
an optional subnet mask. If a mask is specified, any device within the subnet becomes a member of the
specified zone.
• IPv6 address—The IPv6 address of an attached device is in 128 bits in colon- (:) separated) hexadecimal
format.
• Interface—Interface-based zoning is similar to port-based zoning because the switch interface is used to
configure the zone. You can specify a switch interface as a zone member for both local and remote
switches. To specify a remote switch, enter the remote switch WWN (sWWN) or the domain ID in the
particular VSAN.
• Device Alias—A device alias name is a different type of alias and it can be assigned as a member to a
FC alias.
Tip The Cisco NX-OS software supports a maximum of 2048 aliases per VSAN.
Creating FC Aliases
To create an alias, follow these steps:
Procedure
switch(config-fcalias)#
pWWN example:
switch(config-fcalias)# member pwwn 10:00:00:23:45:67:89:ab
fWWN example:
switch(config-fcalias)# member fwwn 10:01:10:01:10:ab:cd:ef
FC ID example:
Procedure
Step 3 Click Aliases in the lower left pane (see Figure 25: Creating an FC Alias, on page 65). The right pane lists the existing
aliases.
Procedure
Step 3 Select the member(s) you want to add from the Fabric pane (see Figure 27: Edit Local Full Zone Database Dialog Box,
on page 66) and click Add to Alias or click the alias where you want to add members and click the Insert icon.
You see the Add Member to Alias dialog box (see Figure 28: Add Member to Alias Dialog Box, on page 66).
Figure 28: Add Member to Alias Dialog Box
Note
The Device Alias radio button is visible only if device alias is in enhanced mode. For more information, see Creating
Device Aliases, on page 151 section.
Step 4 Click the browse button and select a port name or check the LUN check box and click the browse button to configure
LUNs.
Step 5 Click Add to add the member to the alias.
Procedure
Tip You do not have to issue the copy running-config startup-config command to store the active zoneset.
However, you need to issue the copy running-config startup-config command to explicitly store full zone
sets. If there is more than one switch in a fabric, the copy running-config startup-config fabric command
should be issued. The fabric keyword causes the copy running-config startup-config command to be issued
on all the switches in the fabric, and also saves the full zone information to the startup-config on all the switches
in the fabric. This is important in the event of a switch reload or power cycle.
Caution If you deactivate the active zoneset in a VSAN that is also configured for Inter-VSAN Routing (IVR), the
active IVR zoneset (IVZS) is also deactivated and all IVR traffic to and from the switch is stopped. This
deactivation can disrupt traffic in more than one VSAN. Before deactivating the active zoneset, check the
active zone analysis for the VSAN (see the Zone and ZoneSet Analysis, on page 125). To reactivate the IVZS,
you must reactivate the regular zoneset (refer to the Cisco MDS 9000 Series NX-OS Inter-VSAN Routing
Configuration Guide ).
Caution If the currently active zoneset contains IVR zones, activating the zoneset from a switch where IVR is not
enabled disrupts IVR traffic to and from that VSAN. We strongly recommend that you always activate the
zoneset from an IVR-enabled switch to avoid disrupting IVR traffic.
Note The pWWN of the virtual target does not appear in the zoning end devices database in DCNM SAN Client.
If you want to zone the virtual device with a pWWN, you must enter it in the Add Member to Zone dialog
box when creating a zone. However, if the device alias is in enhanced mode, the virtual device names appear
in the device alias database in the DCNM SAN Client zoning window. In this case, users can choose to select
either the device alias name or enter the pWWN in the Add Member to Zone dialog box.
For more information, see the Adding Zone Members, on page 51 section.
Procedure
switch(config-zoneset)#
Example:
switch(config-zoneset-zone)#
switch(config-zoneset-zone)#
Procedure
Step 1 Click the Zone icon in the toolbar (see Figure 12: Zone Icon, on page 49).
Step 2 Enter a filter condition, such as *zo1*, in the Filter text box.
Step 3 Click Go.
Procedure
Step 1 Click the Zone icon in the toolbar (see Figure 12: Zone Icon, on page 49).
Step 2 From the tree view, select Zoneset.
Step 3 Use the Ctrl key to select multiple end devices.
Step 4 Right-click and then select Add to Zoneset.
Step 5 Use the Ctrl key to select multiple zones from the pop-up window displayed.
Step 6 Click Add.
Zone Enforcement
Zoning can be enforced in two ways: soft and hard. Each end device (N port or NL port) discovers other
devices in the fabric by querying the name server. When a device logs in to the name server, the name server
returns the list of other devices that can be accessed by the querying device. If an Nx port does not know about
the FCIDs of other devices outside its zone, it cannot access those devices.
In soft zoning, zoning restrictions are applied only during interaction between the name server and the end
device. If an end device somehow knows the FCID of a device outside its zone, it can access that device.
Hard zoning is enforced by the hardware on each frame sent by an Nx port. As frames enter the switch,
source-destination IDs are compared with permitted combinations to allow the frame at wirespeed. Hard
zoning is applied to all forms of zoning.
Note Hard zoning enforces zoning restrictions on every frame, and prevents unauthorized access.
Switches in the Cisco MDS 9000 Series support both hard and soft zoning.
ZoneSet Distribution
You can distribute full zone sets using one of two methods: one-time distribution at the EXEC mode level or
full zoneset distribution at the configuration mode level.
You can distribute full zone sets using one of two methods: one-time distribution or full zone set distribution.
Table 4: Zone Set Distribution zoneset distribution Command Differences , on page 70 lists the differences
between these distribution methods.
One-Time Distribution zoneset distribute vsan Full Zone Set Distribution zoneset distribute full vsan
Command (EXEC Mode) Command (Configuration Mode)
Distributes the full zoneset immediately. Does not distribute the full zoneset immediately.
Does not distribute the full zoneset information Remembers to distribute the full zoneset information
along with the active zoneset during activation, along with the active zoneset during activation,
deactivation, or merge process. deactivation, and merge processes.
Tip You do not have to issue the copy running-config startup-config command to store the active zoneset.
However, you need to issue the copy running-config startup-config command to explicitly store full zone
sets. If there is more than one switch in a fabric, the copy running-config startup-config fabric command
should be issued. The fabric keyword causes the copy running-config startup-config command to be issued
on all the switches in the fabric, and also saves the full zone information to the startup-config on all the switches
in the fabric. This is important in the event of a switch reload or power cycle.
Procedure
Procedure
Step 1 Expand a VSAN and select a zone set in the Logical Domains pane.
You see the zone set configuration in the Information pane. The Active Zones tab is the default.
Step 3 In the Propagation column, choose fullZoneset from the drop-down menu.
Step 4 Click Apply Changes to propagate the full zone set.
This procedure command only distributes the full zoneset information; it does not save the information to the
startup configuration. You must explicitly save the running configuration to the startup configuration issue
the copy running-config startup-config command to save the full zoneset information to the startup
configuration.
Note The zoneset distribute vsan vsan-id commandone-time distribution of the full zone set is supported in interop
2 and interop 3 modes, not in interop 1 mode.
Use the show zone status vsan vsan-id command to check the status of the one-time zoneset distribution
request.
Procedure
Step 2 Click the appropriate zone from the list in the left pane.
Step 3 Click Distribute to distribute the full zone set across the fabric.
Note Issue the import and export commands from a single switch. Importing from one switch and exporting from
another switch can lead to isolation again.
To import or export the zoneset information from or to an adjacent switch, follow these steps:
Procedure
Procedure
Step 2 Click the Import Active Zoneset or the Export Active Zoneset radio button.
Step 3 Select the switch from which to import or export the zone set information from the drop-down list.
Step 4 Select the VSAN from which to import or export the zone set information from the drop-down list.
Step 5 Select the interface to use for the import process.
Step 6 Click OK to import or export the active zone set.
Issue the import and export commands from a single switch. Importing from one switch and exporting from another
switch can lead to isolation again.
Zoneset Duplication
You can make a copy and then edit it without altering the existing active zoneset. You can copy an active
zoneset from the bootflash: directory, volatile: directory, or slot0, to one of the following areas:
• To the full zoneset
• To a remote location (using FTP, SCP, SFTP, or TFTP)
The active zoneset is not part of the full zoneset. You cannot make changes to an existing zoneset and activate
it, if the full zoneset is lost or is not propagated.
Caution Copying an active zoneset to a full zoneset may overwrite a zone with the same name, if it already exists in
the full zoneset database.
Caution If the Inter-VSAN Routing (IVR) feature is enabled and if IVR zones exist in the active zoneset, then a zoneset
copy operation copies all the IVR zones to the full zone database. To prevent copying to the IVR zones, you
must explicitly remove them from the full zoneset database before performing the copy operation. For more
information on the IVR feature see the Cisco MDS 9000 Series NX-OS Inter-VSAN Routing Configuration
Guide .
Procedure
Procedure
Step 2 Click the Active or the Full radio button, depending on which type of database you want to copy.
Step 3 Select the source VSAN from the drop-down list.
Step 4 If you selected Copy Full, select the source switch and the destination VSAN from those drop-down lists.
Step 5 Select the destination switch from the drop-down list.
Step 6 Click Copy to copy the database.
Procedure
Step 1 Choose Zone > Edit Local Full Zone Database. You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK. You see the Edit Local Full Zone Database dialog box for the selected VSAN (see Figure
33: Edit Local Full Zone Database, on page 78).
Step 3 Choose File > Backup > This VSAN Zones to back up the existing zone configuration to a workstation using TFTP,
SFTP, SCP, or FTP. You see the Backup Zone Configuration dialog box (see Figure 34: Backup Zone Configuration
Dialog Box, on page 78).
Figure 34: Backup Zone Configuration Dialog Box
You can edit this configuration before backing up the data to a remote server.
Step 4 Provide the following Remote Options information to back up data onto a remote server:
a) Using—Select the protocol.
b) Server IP Address—Enter the IP adress of the server.
c) UserName—Enter the name of the user.
d) Password—Enter the password for the user.
e) File Name(Root Path)—Enter the path and the filename.
Step 5 Click Backup or click Cancel to close the dialog box without backing up.
Restoring Zones
To restore the full zone configuration using DCNM SAN Client, follow these steps:
Procedure
Step 1 Choose Zone > Edit Local Full Zone Database. You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK. You see the Edit Local Full Zone Database dialog box for the selected VSAN (see Figure
35: Edit Local Full Zone Database, on page 79).
Figure 35: Edit Local Full Zone Database
Step 3 Choose File > Restore to restore a saved zone configuration using TFTP, SFTP, SCP or FTP. You see the Restore Zone
Configuration dialog box (see Figure 36: Restore Zone Configuration Dialog Box, on page 80).
Step 4 Provide the following Remote Options information to restore data from a remote server:
a) Using—Select the protocol.
b) Server IP Address—Enter the IP address of the server.
c) UserName—Enter the name of the user.
d) Password—Enter the password for the user.
e) File Name—Enter the path and the filename.
Step 5 Click Restore to continue or click Cancel to close the dialog box without restoring.
Note
Click View Config to see information on how the zone configuration file from a remote server will be restored. When
you click Yes in this dialog box, you will be presented with the CLI commands that are executed. To close the dialog
box, click Close.
Note
Backup and Restore options are available to switches that run Cisco NX-OS Release 4.1(3a) or later.
Note Backup option is available to switches that run Cisco NX-OS Release 4.1(3) or later. Restore option is only
supported on Cisco DCNM SAN Client Release 4.1(3) or later.
Procedure
Renaming Zones, Zone Sets, and Aliases Using DCNM SAN Client
To rename a zone, zone set, or alias using DCNM SAN Client, follow these steps:
Procedure
Procedure
Cloning Zones, Zone Sets, FC Aliases, and Zone Attribute Groups Using DCNM
SAN Client
To clone a zone, zone set, fcalias, or zone attribute group, follow these steps:
Procedure
Procedure
Note To clear the zone server database, refer to the Cisco MDS 9000 Series NX-OS Fabric Configuration Guide.
Note After issuing a clear zone database command, you must explicitly issue the copy running-config
startup-config to ensure that the running configuration is used when the switch reboots.
Note Clearing a zoneset only erases the full zone database, not the active zone database.
Note After clearing the zone server database, you must explicitly copy the running configuration to the startup
configuration to ensure that the running configuration is used when the switch reboots.
To use this feature, you need to obtain the ENTERPRISE_PKG license (refer to the Cisco NX-OS Series
Licensing Guide ) and you must enable QoS in the switch (refer to the Cisco MDS 9000 Series NX-OS Quality
of Service Configuration Guide ).
This feature allows SAN administrators to configure QoS in terms of a familiar data flow identification
paradigm. You can configure this attribute on a zone-wide basis rather than between zone members.
Caution If zone-based QoS is implemented in a switch, you cannot configure the interop mode in that VSAN.
Procedure
Configures this zone-attribute to assign high priority QoS traffic to each frame matching
Configures this zone to assign high priority QoS traffic to each frame matching this zone in enhanced mode.
switch(config-zoneset)#
Configures a zoneset called QosZoneset for the specified VSAN (vsan 2) and enters zoneset configuration submode.
Tip
To activate a zoneset, you must first create the zone and a zoneset.
switch(config)#
Procedure
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
Step 2 Click the Policies tab in the Information pane.
You see the Zone policy information in the Information pane (see Figure 39: Zone Policies Tab in the Information Pane,
on page 86).
Figure 39: Zone Policies Tab in the Information Pane
Step 3 Use the check boxes and drop-down menus to configure QoS on the default zone.
Step 4 Click Apply Changes to save the changes.
Note If a member is part of two zones with two different QoS priority attributes, the higher QoS value is implemented.
This situation does not arise in the VSAN-based QoS as the first matching entry is implemented.
To configure the QoS priority attributes for a default zone, follow these steps:
Procedure
switch(config)#
switch(config-default-zone)#
Configuring Default Zone QoS Priority Attributes Using DCNM SAN Client
To configure the QoS priority attributes for a default zone using DCNM SAN Client, follow these steps:
Procedure
Step 3 Choose Edit > Edit Default Zone Attributes to configure the default zone QoS priority attributes (see Figure 40: QoS
Priority Attributes, on page 88).
Figure 40: QoS Priority Attributes
Step 4 Check the Permit QoS Traffic with Priority check box and set the Qos Priority drop-down menu to low, medium, or
high.
Step 5 Click OK to save these changes.
Procedure
Step 3 Choose Edit > Edit Default Zone Attributes to configure the default zone QoS priority attributes.
You see the Modify Default Zone Properties dialog box (see Figure 41: Modify Default Zone Properties Dialog Box, on
page 88).
Figure 41: Modify Default Zone Properties Dialog Box
Step 4 Set the Policy drop-down menu to permit to permit traffic in the default zone, or set it to deny to block traffic in the
default zone.
Step 5 Click OK to save these changes.
The device type information of each device in a smart zone is automatically populated from the Fibre Channel
Name Server (FCNS) database as host, target, or both. This information allows more efficient utilisation of
switch hardware by identifying initiator-target pairs and configuring those only in hardware. In the event of
a special situation, such as a disk controller that needs to communicate with another disk controller, smart
zoning defaults can be overridden by the administrator to allow complete control.
Note • Smart Zoning can be enabled at VSAN level but can also be disabled at zone level.
• Smart zoning is not supported on VSANs that have DMM, IOA, or SME applications enabled on them.
Feature Supported
PWWN Yes
FCID Yes
FCalias Yes
Device-alias Yes
Interface No
IP address No
Feature Supported
Symbolic nodename No
FWWN No
Domain ID No
Procedure
Procedure
Procedure
Step 2 switch(config)# zone convert smart-zoning fcalias name <alias-name> vsan <vsan no>
Fetches the device type information from the nameserver for the fcalias members.
Note
When the zone convert command is run, the FC4-Type should be SCSI-FCP. The SCSI-FCP has bits which determines
whether the device is an initiator or target. If initiator and target are both set, the device is treated as both.
Step 3 switch(config)# zone convert smart-zoning zone name <zone name> vsan <vsan no>
Fetches the device type information from the nameserver for the zone members.
Step 4 switch(config)# zone convert smart-zoning zoneset name <zoneset name> vsan <vsan no>
Fetches the device type information from the nameserver for all the zones and fcalias members in the specified zoneset.
What to do next
Use the show fcns database command to check if the device is initiator, target or both:
Note When device types are explicitly configured in smart zoning, any device must be configured with the same
type in all zones of which the device is a member. A zone member must not be configured as initiator in some
zones and target in other zones.
To configure the device types for zone members, follow these step:
Procedure
Procedure
Step 1 switch(config)# clear zone smart-zoning fcalias name alias-name vsan number
Removes the device type configuration for all the members of the specified fcalias.
Step 2 switch(config)# clear zone smart-zoning zone name zone name vsan number
Removes the device type configuration for all the members of the specified zone.
Step 3 switch(config)# clear zone smart-zoning zoneset name zoneset name vsan number
Removes the device type configuration for all the members of the zone and fcalias for the specified zoneset.
Procedure
Disabling Smart Zoning at Zone Level for a VSAN in the Enhanced Zoning
Mode
To disable smart zoning at the zone level for a VSAN in enhanced zoning mode, follow these steps:
Procedure
Step 3 switch(config-attribute-group)#disable-smart-zoning
Procedure
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
Step 2 Click the Policies tab in the Information pane.
You see the Zone policy information in the Information pane.
Figure 42: Zone Policy Information
Step 3 Check the Broadcast check box to enable broadcast frames on the default zone.
Step 4 Click Apply Changes to save these changes.
information for the specified object is displayed. If you do not request specific information, all available
information is displayed.
Displays Zone Information for All VSANs
Use the show zone name command to display members of a specific zone.
Displays Members of a Zone
Use the show zone member command to display all zones to which a member belongs using the FC ID.
Displays Membership Status
Use the show zone statistics command to display the number of control frames exchanged with other switches.
Displays Zone Statistics
smart-zoning: disabled
rscn-format: fabric-address
Default zone:
qos: none broadcast: disabled ronly: disabled
Full Zoning Database :
DB size: 2002584 bytes
Zonesets:4 Zones:7004 Aliases: 0 Attribute-groups: 1
Active Zoning Database :
DB size: 94340 bytes
Name: zoneset-hac13-200 Zonesets:1 Zones:176
Current Total Zone DB Usage: 2096924 / 2097152 bytes (99 % used)
Pending (Session) DB size:
Full DB Copy size: 0 bytes
Active DB Copy size: 0 bytes
SFC size: 0 / 2097152 bytes (0 % used)
Status: Activation completed at 17:28:04 UTC Jun 16 2014
VSAN: 12 default-zone: deny distribute: full Interop: default
mode: enhanced merge-control: allow
session: none
hard-zoning: enabled broadcast: enabled
smart-zoning: disabled
rscn-format: fabric-address
Default zone:
qos: none broadcast: disabled ronly: disabled
Full Zoning Database :
DB size: 84 bytes
Zonesets:0 Zones:1 Aliases: 0 Attribute-groups: 1
Active Zoning Database :
DB size: 144 bytes
Name: zs1 Zonesets:1 Zones:2
Current Total Zone DB Usage: 228 / 2097152 bytes (0 % used)
Pending (Session) DB size:
Full DB Copy size: 0 bytes
Active DB Copy size: 0 bytes
SFC size: 0 / 2097152 bytes (0 % used)
Status: Commit completed at 14:39:33 UTC Jun 27 201
Use the show zone command to display the zone attributes for all configured zones.
Displays Zone Statistics
Use the show running and show zone active commands to display the configured interface-based zones.
Displays the Interface-Based Zones
A similar output is also available on the remote switch (see the following example).
Displays the Local Interface Active Zone Details for a Remote Switch
Displays How to Create a Zone Attribute-Group to for a VSAN in the Enhanced Mode to Disable Smart
Zoning at an Individual Zone Level
Note After the attribute-group is created, it needs to be applied to any zones requiring smart zoning to be disabled.
Enhanced Zoning
The zoning feature complies with the FC-GS-4 and FC-SW-3 standards. Both standards support the basic
zoning functionalities explained in the previous section and the enhanced zoning functionalities described in
this section.
Administrators can make simultaneous configuration Performs all configurations within a One configuration session for the
changes. Upon activation, one administrator can single configuration session. When you entire fabric to ensure consistency
overwrite another administrator’s changes. begin a session, the switch locks the entire within the fabric.
fabric to implement the change.
If a zone is part of multiple zonesets, you create an References to the zone are used by the Reduced payload size as the zone is
instance of this zone in each zoneset. zonesets as required once you define the referenced. The size is more
zone. pronounced with bigger databases.
The default zone policy is defined per switch. To Enforces and exchanges the default zone Fabric-wide policy enforcement
ensure smooth fabric operation, all switches in the setting throughout the fabric. reduces troubleshooting time.
fabric must have the same default zone setting.
To retrieve the results of the activation on a per Retrieves the activation results and the Enhanced error reporting eases the
switch basis, the managing switch provides a nature of the problem from each remote troubleshooting process.
combined status about the activation. It does not switch.
identify the failure switch.
To distribute the zoning database, you must Implements changes to the zoning Distribution of zone sets without
reactivate the same zoneset. The reactivation may database and distributes it without activation avoids hardware changes
affect hardware changes for hard zoning on the local reactivation. for hard zoning in the switches.
switch and on remote switches.
The MDS-specific zone member types (IPv4 address, Provides a vendor ID along with a Unique vendor type.
IPv6 address, symbolic node name, and other types) vendor-specific type value to uniquely
may be used by other non-Cisco switches. During a identify a member type.
merge, the MDS-specific types can be misunderstood
by the non-Cisco switches.
The fWWN-based zone membership is only Supports fWWN-based membership in The fWWN-based member type is
supported in Cisco interop mode. the standard interop mode (interop mode standardized.
1).
Procedure
Step 1 Verify that all switches in the fabric are capable of working in the enhanced mode.
If one or more switches are not capable of working in enhanced mode, then your request to move to enhanced mode is
rejected.
Step 2 Set the operation mode to enhanced zoning mode. By doing so, you will automatically start a session, acquire a fabric
wide lock, distribute the active and full zoning database using the enhanced zoning data structures, distribute zoning
policies and then release the lock. All switches in the fabric then move to the enhanced zoning mode.
Tip
After moving from basic zoning to enhanced zoning, we recommend that you save the running configuration.
Procedure
Step 1 Verify that the active and full zoneset do not contain any configuration that is specific to the enhanced zoning mode.
If such configurations exist, delete them before proceeding with this procedure. If you do not delete the existing
configuration, the Cisco NX-OS software automatically removes them.
Step 2 Set the operation mode to basic zoning mode. By doing so, you will automatically start a session, acquire a fabric wide
lock, distribute the zoning information using the basic zoning data structure, apply the configuration changes and release
the lock from all switches in the fabric. All switches in the fabric then move to basic zoning mode.
Note
If a switch running Cisco SAN-OS Release 2.0(1b) and NX-OS 4(1b) or later, with enhanced zoning enabled is downgraded
to Cisco SAN-OS Release 1.3(4), or earlier, the switch comes up in basic zoning mode and cannot join the fabric because
all the other switches in the fabric are still in enhanced zoning mode.
Procedure
Procedure
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
You see the zone set configuration in the Information pane.
Step 3 From the Action drop-down menu, choose enhanced to enable enhanced zoning in this VSAN.
Step 4 Click Apply Changes to save these changes.
Procedure
Procedure
If session locks remain on remote switches after using the no zone commit vsan command, you can use the
clear zone lock vsan command on the remote switches.
Note We recommend using the no zone commit vsan command first to release the session lock in the fabric. If
that fails, use the clear zone lock vsan command on the remote switches where the session is still locked.
Procedure
switch(config-attribute-group)# readonly
switch(config-attribute-group)# broadcast
switch(config-attribute-group)# qos priority medium
readonly and broadcast commands are not supported from 5.2 release onwards.
Example:
The attribute-groups are expanded and only the configured attributes are present in the active zoneset.
To configure attribute groups, refer to the Cisco MDS 9000 Series NX-OS Fabric Configuration Guide.
The databases contain zone sets with the Successful. The union of the local
same name but different zones, aliases, and and adjacent
attributes groups. databases.
The databases contains a zone, zone alias, Failed. ISLs are isolated.
or zone attribute group object with same
name 1 but different members.1
Merge Process
When two Fibre Channel (FC) switches that have already been configured with active zonesets and are not
yet connected are brought together with an Extended ISL (EISL) link, the zonesets merge. However, steps
must be taken to ensure zone consistency before configuring and activating new zones.
Best Practices
When a zone merge occurs, as long as there is not competing information, each switch learns the others zones.
Each switch then has three configuration entities. The switches have:
• The saved configuration in NVRAM. This is the configuration as it was the last time the copy
running-configuration startup-configuration command was issued.
• The running configuration. This represents the configuration brought into memory upon the last time the
MDS was brought up, plus any changes that have been made to the configuration. With reference to the
zoning information, the running configuration represents the configurable database, known as the full
database.
• The configured zoning information from the running configuration plus the zoning information learned
from the zone merge. This combination of configured and learned zone information is the active zoneset.
When an MDS is booted, it comes up with the configuration previously saved in NVRAM. If you configured
the switch after loading the configuration from NVRAM, there is a difference between the bootup and running
configuration until the running configuration is saved to the startup configuration. This can be likened to
having a file on the local hard drive of your PC. The file is saved and static, but if you open the file and edit,
there exists a difference between the changed file and the file that still exists on saved storage. Only when
you save the changes, does the saved entity look represent the changes made to the file.
When zoning information is learned from a zone merge, this learned information is not part of the running
configuration. Only when the zone copy active-zoneset full-zoneset vsan X command is issued, the learned
information becomes incorporated into the running configuration. This is key because when a zone merge is
initiated by a new EISL link or activating a zoneset, the zoneset part is ignored by the other switch and the
member zone information is considered topical.
Caution The zone copy command will delete all fcalias configuration.
Example
For example, you have two standalone MDS switches, already in place and each with their own configured
zone and zoneset information. Switch 1 has an active zoneset known as set A, and Switch 2 has an active
zoneset known as set B. Within set A on Switch 1 is zone 1, and on Switch 2, set B has member zone 2. When
an ISL link is created between these two switches, each sends their zoneset including their zone information
to the other switch. On a merge, the switch will select zoneset name with the higher ASCII value and then
merge their zone member. After the merge, both switches will have a zoneset name set B with zone member
zone 1 and zone 2.
Everything should be still working for all of the devices in zone 1 and zone 2. To add a new zone, you have
to create a new zone, add the new zone to the zoneset, and then activate the zoneset.
Step-by-step, the switches are booted up and have no zoning information. You need to create the zones on
the switches and add them to the zonesets.
Basic mode: When zones are in basic mode, refer to the sample command outputs below.
1. Create zone and zoneset. Activate on Switch 1.
Switch2# show zoneset active vsan 100 zoneset name setB vsan 100
zone name zone1 vsan 100
pwwn 11:11:11:11:11:11:11:1a
pwwn 11:11:11:11:11:11:11:1b
Note The name of the newly merged zoneset will be the name of the zoneset with alphabetically higher value. In
the given example, the active zoneset is setB. To avoid future zoneset activation problems, the zone copy
active-zoneset full-zoneset vsan 100 command should be given, at this point on the switch. Examine if the
command is given, and how the new zoning information is handled.
When the zone copy command is issued, it adds the learned zone information, zone 2 in this case, to the
running configuration. If zone 2 has not been copied from residing in memory to copied into the running
configuration, zone 2 information is not pushed back out.
Note The zone copy command will delete all fcalias configuration.
Running-Configuration of Switch1 (before issuing the zone copy active-zoneset full-zoneset vsan 100
command).
Switch1# show run | b "Active Zone Database Section for vsan 100"
!Active Zone Database Section for vsan 100
zone name zone1 vsan 100
pwwn 11:11:11:11:11:11:11:1a
pwwn 11:11:11:11:11:11:11:1b
Running-Configuration of Switch1 ( after issuing the "zone copy active-zoneset full-zoneset vsan 100"
command)
Switch1# show run | b "Active Zone Database Section for vsan 100"
!Active Zone Database Section for vsan 100
zone name zone1 vsan 100
pwwn 11:11:11:11:11:11:11:1a
pwwn 11:11:11:11:11:11:11:1b
Running-Configuration of Switch2 ( before issuing the "zone copy active-zoneset full-zoneset vsan 100"
command)
Switch2# show run | b "Active Zone Database Section for vsan 100"
!Active Zone Database Section for vsan 100
zone name zone2 vsan 100
pwwn 22:22:22:22:22:22:22:2a
pwwn 22:22:22:22:22:22:22:2b
Running-Configuration of Switch2 ( after issuing the "zone copy active-zoneset full-zoneset vsan 100"
command)
Switch2# show run | b "Active Zone Database Section for vsan 100"
!Active Zone Database Section for vsan 100
zone name zone2 vsan 100
pwwn 22:22:22:22:22:22:22:2a
pwwn 22:22:22:22:22:22:22:2b
Referring back to the three entities of configuration, they are as follows on zone 1 before the zone merge:
• Saved configuration: nothing since zone information has not been saved by issuing the copy run start
command.
• Running configuration: consists of zone 1.
• Configured and learned information: consists of zone 1.
Zone 2 has not become part of the running configuration. Zone 2 has been learned, and is in the active zoneset.
Only when the zone copy active-zoneset full-zoneset vsan 100 command is issued, zone 2 becomes copied
from being learned to added to the running configuration. The configuration looks as follows after the command
is issued:
Note The zone copy command will delete all fcalias configuration.
Commands
By default zone in basic mode will only distribute active zoneset database only, this command was introduced
in 1.0.4 SAN-OS will propagate active zoneset and full zoneset database:
zoneset distribute full vsan vsan_id
If the zone update or zoneset activation is going on, the above command must be explicitly enabled on each
VSAN on every switch.
Enhanced mode: When zones are in enhanced mode, refer to the sample command outputs below.
pwwn 22:22:22:22:22:22:22:2b
Note Unlike basic mode, the entire zone database is merged in the case of enhanced mode, wherein Switch1 has
the information of zonesets originally configured in Switch2 and vice versa.
4. Bring ISL link up and verify zone merge on Switch2. After bringing up ISL between two switches:
Switch 2
Procedure
Step 2 Select the first switch to be analyzed from the Check Switch 1 drop-down list.
Step 3 Select the second switch to be analyzed from the And Switch 2 drop-down list.
Step 4 Enter the VSAN ID where the zone set merge failure occurred in the For Active Zoneset Merge Problems in VSAN Id
field.
Step 5 Click Analyze to analyze the zone merge.
Step 6 Click Clear to clear the analysis data in the Zone Merge Analysis dialog box.
Procedure
Procedure
Broadcasting a Zone
You can specify an enhanced zone to restrict broadcast frames generated by a member in this zone to members
within that zone. Use this feature when the host or storage devices support broadcasting.
Table 8: Broadcasting Requirements , on page 120 identifies the rules for the delivery of broadcast frames.
No Yes Yes
Yes No No
Tip If any NL port attached to an FL port shares a broadcast zone with the source of the broadcast frame, then the
frames are broadcast to all devices in the loop.
Procedure
Procedure
Procedure
Displays the Pending Active ZoneSet Information for the VSAN to be Committed
Displays the Difference Between the Pending and Effective Zone Information for the Specified VSAN
Exchange Switch Support (ESS) defines a mechanism for two switches to exchange various supported features.
Displays the ESS Information for All Switches in the Specified VSAN
Note A merge failure occurs when a switch supports more than 8000 zones per VSAN but its neighbor does not.
Also, zoneset activation can fail if the switch has more than 8000 zones per VSAN and not all switches in the
fabric support more than 8000 zones per VSAN.
To delete zones and compact the zone database for a VSAN, follow these steps:
Procedure
Note The maximum size of the full zone database per VSAN is 4096 KB.
Note The maximum size of the zone database per VSAN is 4096 KB.
ZoneSet Analysis
See the Cisco MDS 9000 Series Command Reference for the description of the information displayed in the
command output.
TCAM Regions
TCAM is divided into several regions of various sizes. The main regions and the type of programming contained
in each region are described in Table 9: TCAM Regions , on page 127:
Region 3 - Zoning
Zoning Types
The Cisco MDS platform uses two types of zoning - 'Hard' and 'Soft' zoning.
Soft zoning - In this mode only control plane traffic is policed by the switch supervisor services. In particular,
the Fibre Channel Name Server (FCNS) will limit the list of permitted devices in an FCNS reply to only those
that are in the zone configuration. However, the end device data plane traffic is unpoliced. This means a rogue
end device may connect to other devices it is not zoned with.
Hard zoning - In this mode both control plane and data plane traffic are policed. Control plane traffic is policed
by the switch supervisor and data plane traffic is policed on each ingress port with hardware assistance. The
policing rules are set by the zoneset which programmed into each linecard. The destination of each frame is
checked by hardware and, if it is not permitted by zoning, it is dropped. In this mode any device can only
communicate with end devices it is authorized to.
By default, both types of zoning are enabled, with hard zoning used in priority over soft zoning. In the event
that the system is unable to use hard zoning due to hardware resource exhaustion it will be disabled and the
system will fall back to use soft zoning
The following example shows how Cisco MDS programs TCAM on a port:
The following example shows a zone in the active zone set for a VSAN. This is the basic programming that
exists on an interface because of Hard zoning.
zone1
member host (FCID 0x010001)
member target1 (FCID 0x010002)
Note In addition to what is provided here, additional programming exists. Moreover, any TCAM table is ended by
a drop-all entry.
The mask indicates which parts of the FCIDs are matched with the input frame. So, when there is a mask
0xffffff, the entire FCID is considered when matching it to the ACL entry. If the mask is 0x000000, none of
it is considered because, by default, it will match all the FCIDs.
In the above programming example, note that when a frame is received on fc1/1, and if it has a source ID(FCID)
of 0x010001(the host) and a destination ID(FCID) of 0x010002(Target1), it will be permitted and routed to
the destination. If it is any other end-to-end communication, it will be dropped.
The following example shows another scenario where zoning is changed:
zone1
member host (FCID 010001)
member target1 (FCID 010002)
member target2 (FCID 010003)
member target3 (FCID 010004)
The above example demonstrates that the number of TCAM entries consumed by a zone (N) is equal to
N*(N-1). So, a zone with four members would have used a total of 12 TCAM entries (4*3 = 12). Note the
drop-all entry does not count against the N*(N-1) rule.
The above example shows two entries in each of the target interfaces (fc1/2-fc1/4) that are probably not needed
since it is usually not advantageous to zone multiple targets together. For example, in fc1/2, there is an entry
that permits Target1 to communicate with Target2, and an entry that permits Target1 to communicate with
Target3.
As these entries are not needed and could even be detrimental, they should be avoided. You can avoid the
addition of such entries by using single-initiator or single-target zones (or use Smart Zoning).
Note If the same two devices are present in more than one zone in a zone set, TCAM programming will not be
repeated.
The following example shows a zone that is changed to three separate zones:
zone1
member host (FCID 010001)
member target1 (FCID 010002)
zone2
member host (FCID 010001)
member target2 (FCID 010003)
zone3
member host (FCID 010001)
member target3 (FCID 010004)
Note that in the above example, the target-to-target entries are not found, and that six of the 12 entries are no
longer programmed. This results in lesser use of TCAM and better security (only the host can communicate
with the three targets, and the targets themselves can communicate only with one host, and not with each
other).
• Forwarding engine 3 has only one entry that is currently in use out of the total 2852 in the zoning region.
The following example shows the output from Cisco MDS 9710 switch with a 2/4/8/10/16 Gbps Advanced
Fibre Channel Module (DS–X9448–768K9):
The following example shows the output from Cisco MDS 9396V switch with a 2/4/8/10/16/32/64 Gbps
Advanced Fibre Channel Module (DS–X9448–768K9):
switch9396v# show system internal acl tcam–usage
Input TCAM Entries:
=====================
Region1 Region2 Region3 Region4
Mod Fwd Dir TOP SYS SECURITY ZONING BOTTOM
Eng Use/Total Use/Total Use/Total(Anl) Use/Total(Anl)
--- --- ------ ---------- ---------- ---------------- --------------
1 0 INPUT 126/26208 0/13120 0/65536(0) 28/26208(0)
1 1 INPUT 122/26208 0/13120 2/65536(0) 27/26208(0)
1 2 INPUT 150/26208 0/13120 0/65536(0) 32/26208(0)
1 3 INPUT 126/26208 0/13120 0/65536(0) 28/26208(0)
Note The commands that are used to view TCAM usage on fabric switches are different from the ones used for
director–class switches. For MDS 9148, MDS 9148S, and MDS 9250i fabric switches, use the show system
internal acltcam-soc tcam-usage command. For director class switches, MDS 9396V, MDS 9396S, and 32
Gbps fabric switches, use the show system internal acl tcam-usage command.
Switch or Module Forwarding Port Ranges Forwarding Zoning Region Bottom Region
Engines Engine Number Entries Entries
Switch or Module Forwarding Port Ranges Forwarding Zoning Region Bottom Region
Engines Engine Number Entries Entries
Switch or Module Forwarding Port Ranges Forwarding Zoning Region Bottom Region
Engines Engine Number Entries Entries
Switch or Module Forwarding Port Ranges Forwarding Zoning Region Bottom Region
Engines Engine Number Entries Entries
Note It is not recommended that you use interface, fWWN, or domain-ID based zoning for devices that are connected
to the edge Cisco N-Port Virtualization (NPV) switches.
F port channels provide fault tolerance and performance benefits on connections to N-Port Virtualization
(NPV) switches, including Cisco UCS Fabric Interconnects (FIs). F port channels present unique challenges
to ACL TCAM programming. When F ports are aggregated into a port channel, ACL TCAM programming
is repeated on each member interface. Consequently, these types of port channels multiply the amount of
TCAM entries needed. Because of this, it is imperative that the member interfaces are allocated as optimally
as possible, and that zoning best practices are also followed. Given that F port channels can contain 100+ host
logins, TCAM can easily be exceeded, especially for fabric switches if best practices are not followed.
The following is a sample topology:
This example assumes that the port channel (PC) contains 8 interfaces, fc1/1-fc1/8.
In addition, the following two zones are active:
zone1
member host (host 0x010001)
member target1 (target1 0x010002)
zone2
member host (host 0x010001)
In such a scenario, the following ACL programming will be present on each member of the PC:
The above example shows the ACL TCAM programming that will be duplicated on each member of the F
port-channel.
The following are the best practices for efficient use of TCAM with respect to F ports and F port-channels to
optimize TCAM usage on a forwarding engine:
• Distribute port-channel member interfaces into different forwarding engines, especially on fabric switches.
• If TCAM usage is still too high in the case of port-channel with a large number of interfaces, then split
the port-channel into two separate port-channels each with half the interfaces. This provides redundancy
but reduces the number of FLOGIs per individual port-channel and thus reduces TCAM usage.
• Distribute member interfaces into separate linecards on director-class switches.
• Distribute member interfaces into forwarding engines with lower TCAM zoning region usage.
• Use single-initiator zones, single-target zones, or Smart Zoning.
In this topology:
• Both Cisco MDS 9148S-1 and MDS 9148S-2 are in the IVR VSAN topology:
Note Domains 0x44 in VSAN 1, 0x21 and 0x36 in VSAN 2, and 0x55 in VSAN 3 are
virtual domains created by IVR NAT.
• The following is the ACL TCAM programming for the IVR zoning topology:
Note Besides the entries in this example, there are other entries that IVR adds to capture
important frames such as PLOGIs, PRILIs, and ABTS.
The programming on the host and target1 ports is similar to the way it is without IVR, except that the FCIDs
and VSANs are explicitly forwarded to an egress port and are rewritten to values that are appropriate for the
transit VSAN (VSAN 2). These forwarding and rewrite entries are separate and are not included in the
TCAM-usage values.
However,now, on the ISLs in both the switches, programming that did not exist earlier is present. When frames
from Host to Target1 are received by Cisco MDS 9148S-2 fc1/2, they are rewritten to the values in VSAN3
where the target resides. In the reverse direction, when frames from Target1 to the Host are received by Cisco
MDS 9148S-1 fc1/2, they are rewritten to the values in VSAN 1 where the Host resides. Therefore, for each
VSAN transition on an ISL (that typically occurs across a transit VSAN) there is TCAM programming for
each device in the IVR zone set.
Consequently,most of the best practices followed for the F and TF port channels should be followed to ensure
that TCAM is utilized as efficiently as possible for the following purposes:
Note Unlike F and TF port-channels, the ACLTCAM programming on ISLs will be the same quantity regardless
if the ISLs are part of a port-channel or not. If there are "n" ISLs between two MDS switches, then it doesn't
matter if they are in one port-channel, two port-channels or just individual links. The ACLTCAM programming
will be the same.
• Distribute port-channel member interfaces into different forwarding engines, especially on fabric switches.
• Distribute member interfaces into different linecards on director-class switches.
• Distribute member interfaces into forwarding engines with lower TCAM zoning region usage.
• Use single-initiator zones, single-target zones, or Smart Zoning.
Note By default, the Zone Server- FCNS Shared Database option is enabled.
Procedure
Example
Enabling Zone Server-FCNS Shared Database
This example shows how to enable database sharing for the active zoneset in VSAN 1 only:
Procedure
Example
Disabling Zone Server-FCNS Shared Database
This example shows how to disable database sharing for the active zone set in VSAN 1:
Procedure
Example
Enabling Zone Server- SNMP Optimizations
This example shows how to enable zone server-SNMP optimization:
Procedure
Example
Disabling Zone Server- SNMP Optimizations
This example shows how to disable zone server-SNMP optimization:
Note • By default, the Zone Server Delta Distribution feature is disabled and functions in enhanced mode only.
• All the switches in a fabric should have the Zone Server Delta Distribution feature enabled. If a switch
is added to the fabric with Zone Server Delta Distribution feature disabled, it will disable the Zone Server
Delta Distribution feature on all the switches in the fabric.
• The Zone Server Delta Distribution feature is supported only on Cisco MDS switches, beginning from
Cisco MDS NX-OS Release 7.3(0)D1(1).
• The Zone Server Delta Distribution feature is not available on IVR enabled switches.
Procedure
Example
Enabling Zone Server Delta Distribution
This example shows how to enable distribution of changes in data in a Zone Server:
Procedure
Example
Disabling Zone Server Delta Distribution
This example shows how to disable distribution of changes in data in a Zone Server:
Default Settings
Table lists the default settings for basic zone parameters.
Parameter Default
Full zone set distribute The full zone set is not distributed.
Note • For applications such as NX-OS processes (zone, dpvm, ivr, and so on), the device-alias configurations
get mapped to their PWWNs when device-alias is in basic mode. Whereas if device-alias is in enhanced
mode, the device-alias configuration of the applications do not get mapped to their PWWNs immediately
but will remain as configured in application which is referred as native form or format.
• From Cisco MDS NX-OS Release 8.5(1), the default device alias mode is enhanced mode.
When using device alias in basic mode, NX-OS processes such as zone, DPVM, IVR, and so on, immediately
expand the device alias name into its associated pWWN in the configuration. For example, when a device
alias member is added to a zone, it will be added as a pWWN member and not as a device alias member.
Therefore, when you change the pWWN for the device alias entry any configuration (besides device alias)
does not get automatically updated. You should manually edit the zones containing that device alias by
removing the old entry and reconfiguring the zones and any other configuration where the PWWN is used by
removing the old PWWN entry and adding it back with the same device alias name that now has the updated
PWWN. After that is done, the configuration should be made active in whatever method is appropriate for
the change. For example, if a zone was modified then the zoneset should be reactivated and committed, if
necessary.
When using device alias in enhanced mode, NX-OS processes such as zone, DPVM, IVR, and so on, store
the device alias names natively in the configuration as specified instead of expanding to pWWNs. The
applications track the device alias database changes and take the necessary actions to enforce any changes
made (for example like renaming a device alias).
In this mode, since the configuration is accepted in the native form, when the pWWN for the device alias is
changed, the zones or other configuration containing that device alias are automatically updated.
Note Because the device alias was previously running in the basic mode, the applications do not have any prior
native device alias configuration.
The applications check for an existing device alias configuration in the native format. If the device alias is in
the native format, the applications reject the request, and the device alias mode cannot be changed to basic.
All the native device alias configurations (both on local and remote switches) must be explicitly removed, or
all the device alias members must be replaced with the corresponding pWWNs before changing the mode
back to basic.
Note Ensure that all the switches in a fabric are running a minimum of Cisco MDS NX-OS Release 7.3(0)D1(1)
with the Device Alias Diffs-Only feature enabled.
Procedure
This example shows the device alias status during an active session when the Device Alias Diff-Only Distribution feature
is disabled on a switch and in a fabric:
Example:
Note
The status of Diffs-only distribution in session does not change during a session.
Note The Diffs-Only Distribution feature should be enabled on all the switches in a fabric for the device
alias entries (more than 12,000) to be supported. If the Diffs-Only Distribution feature is not enabled
on all the switches in a fabric, we recommend that you do not configure more than 12,000 entries.
Note The applications should not accept any native device alias configuration over SNMP if the device alias is
running in the basic mode on that particular switch.
Note Confcheck will be added when the enhanced mode is turned on and removed when it is turned off. Applications
should add confcheck if they have a device alias configuration in the native format, and remove it after the
configuration is removed.
Note For releases prior to Cisco MDS NX-OS Release 9.2(2), if the device-alias name
was 64 characters in length, the DPVM and other application databases do not
update properly. Restrict the number of characters in the device-alias name to
63.
Aliases are limited to the specified VSAN. You can define device aliases without specifying the VSAN
number. You can also use the same definition in one or more
VSANs without any restrictions.
Zone aliases are part of the zoning configuration. The alias Device aliases can be used with any feature that uses the pWWN.
mapping cannot be used to configure other features.
You can use any zone member type to specify the end devices. Only pWWNs are supported along with new device aliases such
as IP addresses.
Configuration is contained within the Zone Server database and Device aliases are not restricted to zoning. Device alias
is not available to other features. configuration is available to the FCNS, zone, fcping, traceroute,
and IVR applications.
FC aliases are not displayed with the associated WWNs in the Device aliases are displayed with the associated WWNs in the
show command outputs like show zoneset active, show flogi show command outputs like show zoneset active, show flogi
database, and show fcns database. database, and show fcns database.
FC aliases are not distributed as part of active zoneset and are Device Aliases are distributed through CFS.
only distributed as part of full zone database as per the FC
standards.
Procedure
switch# show
device-alias status
Fabric Distribution: Disabled
Database:- Device Aliases 25
Status of the last CFS operation issued from this switch:
==========================================================
Operation: Commit
Status: Failed (Reason: Operation is not permitted as the fabric distribution is
currently disabled.)
Note From the Cisco MDS NX-OS Release 6.2.9 onwards, the ASCII configuration replay takes longer
time for DDAS (Distributing Device Alias Services) without the write erase command.
If a PWWN is reused while configuring an add or delete command, then the command fails and gets
moved to the rejected list.
If a device-alias name is reused in an add command which was earlier being renamed in a rename
command, the command fails and gets moved to the rejected list.
Committing Changes
If you commit the changes made to the pending database, the following events occur:
1. The pending database contents overwrites the effective database contents.
2. The pending database is emptied of its contents.
3. The fabric lock is released for this feature.
Procedure
Note
After the device-alias commit is complete, the running configuration is modified on all switches participating in device-alias
distribution. You can then use the copy running-config startup-config fabric command to save the running-config to
the startup-config on all the switches in the fabric.
Procedure
If the device-alias confirm-commit command is enabled, on committing the pending database, the pending-diff is displayed
on the console and user is prompted for Yes or No. If the device -alias confirm-commit command is disabled, the
pending-diff is not displayed and the user is not prompted for Yes or No.
Discarding Changes
If you discard the changes made to the pending database, the following events occur:
1. The effective database contents remain unaffected.
2. The pending database is emptied of its contents.
3. The fabric lock is released for this feature.
To discard the device alias session, perform this task:
Procedure
switch# show
device-alias status
Fabric Distribution: Enabled
Database:- Device Aliases 24
Status of the last CFS operation issued from this switch:
==========================================================
Operation: Abort
Status: Success
Tip The changes are only available in the volatile directory and are subject to being discarded if the switch is
restarted.
To clear device-alias session, use the clear device-alias session command in CONFIGURATION mode.
To verify the status of the clear operation, use the show device-alias session status command.
Clearing Statistics
To clear all the statistics, use the clear device-alias statistics command in CONFIGURATION
mode.
Procedure
switch# show
device-alias status
Fabric Distribution: Enabled <-------------------------------Distribution is enabled
Database:-Device Aliases 24
Locked By:-User “Test” SWWN 20:00:00:0c:cf:f4:02:83<-Lock holder’s user name and switch ID
Pending Database:- Device Aliases 24
Status of the last CFS operation issued from this switch:
==========================================================
Operation: Enable Fabric Distribution
Status: Success
switch# show
device-alias status
Fabric Distribution: Disabled
Database:- Device Aliases 24
Status of the last CFS operation issued from this switch:
==========================================================
Operation: Disable Fabric Distribution
Status: Success
Tip Ensure to copy any required zone aliases to the device alias database as required by your configuration.
When an import operation is complete, the modified alias database is distributed to all other switches in the
physical fabric when you perform the commit operation. At this time if you do not want to distribute the
configuration to other switches in the fabric, you can perform the abort operation and the merge changes are
completely discarded.
This section includes the following topics:
Note Device alias does not allow importing and manually adding of device alias entries to the database in the same
session.
To import the zone alias for a specific VSAN, follow these steps:
SUMMARY STEPS
1. switch# config t
2. switch(config)# device-alias import fcalias vsan 3
DETAILED STEPS
Procedure
switch# config t
switch(config)#
Step 2 switch(config)# device-alias import fcalias vsan 3 Imports the fcalias information for the specified VSAN.
To display device alias information in zone sets, use the
show zoneset command (see the following examples ).
switch# show
device-alias database
device-alias name SampleName pwwn 21:00:00:e0:8b:0b:66:56
device-alias name x pwwn 21:01:00:e0:8b:2e:80:93
Total number of entries = 2
switch# show
device-alias database pending
There are no pending changes
switch# show
device-alias database pending
device-alias name x pwwn 21:01:00:e0:8b:2e:80:93
device-alias name SampleName pwwn 21:00:00:e0:8b:0b:66:56
device-alias name y pwwn 21:00:00:20:37:39:ab:5f
device-alias name z pwwn 21:00:00:20:37:39:ac:0d
Total number of entries = 4
switch# show
device-alias name x pending
device-alias name x pwwn 21:01:00:e0:8b:2e:80:93
switch# show
device-alias pwwn 21:01:00:e0:8b:2e:80:93 pending
device-alias name x pwwn 21:01:00:e0:8b:2e:80:93
switch# show
device-alias database pending-diff
- device-alias name Doc pwwn 21:01:02:03:00:01:01:01
+ device-alias name SampleName pwwn 21:00:00:e0:8b:0b:66:56
switch# show
device-alias pwwn 21:01:01:01:01:11:01:01
device-alias name Doc pwwn 21:01:01:01:01:11:01:01
Where available, device aliases are displayed regardless of a member being configured using a
device-alias command or a zone-specific member pwwn command.
switch# show
device-alias statistics
Device Alias Statistics
===========================================
Lock requests sent: 2
Database update requests sent: 1
Unlock requests sent: 1
Lock requests received: 1
Database update requests received: 1
Unlock requests received: 1
Lock rejects sent: 0
Database update rejects sent: 0
Unlock rejects sent: 0
Lock rejects received: 0
Database update rejects received: 0
Unlock rejects received: 0
Merge requests received: 0
Merge request rejects sent: 0
Merge responses received: 2
Default Settings
Table 13: Default Device Alias Parameters , on page 162 lists the default settings for device alias parameters.
Parameters Default
Device alias fabric lock state Locked with the first device alias task.
2007 Apr 9 15:52:42 switch-1 %CFS-3-MERGE_FAILED: Merge failed for app device-alias, local
switch wwn 20:00:00:0d:ec:2f:c1:40,ip 172.20.150.38, remote switch wwn
20:00:00:0d:ec:04:99:40, ip 172.20.150.30
2007 Apr 9 15:52:42 switch-1 %DEVICE-ALIAS-3-MERGE_FAILED: Databases could not be merged
due to mismatch.
Note Use the device-alias distribute command to initiate a merge or remerge of device-alias databases. Use the
device-alias commit command to push a switch's device-alias database to all the other switches in a fabric.
If the switches whose device-alias databases are not merged (more than one merge master is shown in the
output of the show cfs merge status name device-alias command), then the device-alias commit command
causes the device-alias databases that are not merged to be overwritten.
• Device aliases should be used to simplify the management of world wide names (WWNs) whenever
possible. It is easier to identify devices with aliases rather than with WWNs. Hence, you should assign
aliases to WWNs to easily identify the WWNs.
• Device-alias names are case-sensitive.
• Operate device aliases in Enhanced mode whenever possible. In Enhanced mode, applications accept a
device-alias name in its native format, rather than expanding the alias to a port world wide name (pWWN).
Because applications such as zone server, Inter-VSAN Routing (IVR), Port Security Manager (PSM),
and Dynamic Port VSAN Membership automatically track and enforce device-alias membership changes,
you have a single point of change.
Caution Avoid performing a blank commit to resolve Cisco Fabric Services (CFS) merge
failures. A blank commit overwrites the device-alias databases on all the switches
with the device-alias database on the local switch.
Note A blank commit is a device-alias commit that is used when there are no changes
(including mode changes), or when it is okay to overwrite the device-alias
databases on the remote switches with the local switch’s device-alias database.
Note Each time device-alias changes are committed, the running configuration should
be copied to the startup configuration on all the switches that were updated. Use
the copy running-config startup-config fabric command to copy the running
configuration to the startup configuration for all the switches in the fabric. If you
do not copy the running configuration to the startup configuration after the
device-alias changes are committed, and if the switch reloads, or loses power and
restarts, the startup configuration will not have the correct device-alias database
and merge failure will occur.
• You will be unable to upgrade to Cisco MDS NX-OS Release 9.2(2) or later releases if you have configured
any device-alias names using 64 alphanumeric characters. For more information, see the Cisco MDS
9000 NX-OS Software Upgrade and Downgrade Guide, Release 9.x.
Procedure
Step 1 Run the show cfs merge status name device-alias command to review the CFS or device-alias merge failure syslogs to
confirm that the merge failed:
Local Fabric
--------------------------------------------------------------------------------
Switch WWN IP Address
--------------------------------------------------------------------------------
20:00:54:7f:ee:1b:0e:b0 10.127.103.211 [Merge Master] <<< Merge Master#1
[switch-1]
Remote Fabric
--------------------------------------------------------------------------------
Switch WWN IP Address
--------------------------------------------------------------------------------
20:00:54:7f:ee:1b:0e:50 10.197.111.54 [Merge Master] <<< Merge Master#2
Note
A properly merged device-alias application should only show a single merge master. If there is more than one merge
master, as shown in the above example, it indicates that the device-alias databases are not merged.
Step 2 Use the no device-alias distribute command on the switch in which the merge failure occurred in order to disable the
device-alias distribution:
Step 3 Resolve merge failure on the switch. See Resolving Merge Failures, on page 165 section.
Resolving Duplicate Device Alias Names (Same Device Alias Name, Different pWWNs)
Note A device-alias name is considered to be duplicate when the same device-alias name is used to point to different
pWWNs.
Procedure
Step 1 Run the show device-alias merge status command to identify if the reason for the merge failure is a database mismatch:
Note
A properly merged device-alias application should only show a single merge master. If there is more than one merge
master, as shown in the above example, it indicates that the device-alias databases are not merged.
Step 2 Review the CFS or the device-alias merge failure syslog to confirm that the merge failed. Alternatively, run the show
cfs merge status name device-alias command to view the status of the merge:
-------------------------------------------------------------------------
20:00:00:0d:ec:2f:c1:40 172.20.150.38 [Merge Master] <<< Merge Master#1
switch-1
Total number of switches = 1
Remote Fabric
-------------------------------------------------------------------------
Switch WWN IP Address
-------------------------------------------------------------------------
20:00:00:0d:ec:04:99:40 172.20.150.30 [Merge Master] <<< Merge Master#2
switch-2
Total number of switches = 1
Step 3 Depending on the Cisco MDS NX-OS release your switch is using, run one of the following commands:
• Cisco MDS NX-OS Release 8.1(1) and later releases
Run the show device-alias merge conflicts command to display the device alias and pWWNs that are causing the
merge failure.
Note
Run the show device-alias merge conflicts command from a switch listed as a merge master.
In the following example, the same device-alias name, A1, is assigned to two different pWWNs—a pWWN on a
local switch and a pWWN on a peer switch:
Step 4 Run the device-alias name name pwwn id command to change the pWWN on one of the switches to match the pWWN
on the other switch.
Note
Perform this step after device-alias distribution is disabled by running the no device-alias distribute command.
In the following example, the pWWN 21:01:01:01:01:01:01:02 on switch-1 is changed to match the pWWN
21:01:01:01:01:01:01:03 on switch-2:
switch-1# configure
Enter configuration commands, one per line. End with CNTL/Z.
switch-1(config)# device-alias database
switch-1(config-device-alias-db)# no device-alias name A1
switch-1(config-device-alias-db)# show device-alias database | i A1
switch-1(config-device-alias-db)# device-alias name A1 pwwn 21:01:01:01:01:01:01:03
switch-1(config-device-alias-db)# show device-alias database | i A1
device-alias name A1 pwwn 21:01:01:01:01:01:01:03
Step 5 If there are more duplicate device-alias names, perform step Step 3, on page 166 and step Step 4, on page 166 to resolve
the duplicate device-alias names issue.
Step 6 Use the device-alias distribute command to enable the device-alias distribution and initiate a merge:
Step 7 Use the show cfs merge status name device-alias command to verify in the output if the merge was successful.
Procedure
Step 1 Run the show device-alias merge status command to identify if the reason for the merge failure is a database mismatch:
Note
A properly merged device-alias application should only show a single merge master. If there is more than one merge
master, as shown in the above example, it indicates that the device-alias databases are not merged.
Step 2 Review the CFS or the device-alias merge failure syslog to confirm that the merge failed. Alternatively, run the show
cfs merge status name device-alias command to view the status of the merge:
Remote Fabric
-------------------------------------------------------------------------
Switch WWN IP Address
-------------------------------------------------------------------------
20:00:00:0d:ec:04:99:40 172.20.150.30 [Merge Master] <<< Merge Master#2
switch-2
Total number of switches = 1
Step 3 Depending on the Cisco MDS NX-OS release your switch is using, run one of the following commands:
• Cisco MDS NX-OS Release 8.1(1) and later releases
Use the show device-alias merge conflicts command to display the device alias and pWWNs that are causing a
merge failure. Use the no device-alias distribute command, followed by the device-alias distribute command to
update the information about the merge conflicts.
Note
Run the show device-alias merge conflicts command from a switch listed as a merge master.
In the following example, the pWWN 21:01:01:01:01:01:01:02 is mapped to device-alias A3 on switch-1, and to
device-alias A1 on switch-2:
Step 4 Run the device-alias name name pwwn id command to change the device-alias name on one of the switches to match
the device-alias name on the other switch.
Note
Perform this step after device-alias distribution is disabled by running the no device-alias distribute command.
In the following example, the device-alias name A3 on switch-1 is changed to match the device-alias name A1 on switch-2:
switch-1# configure
Enter configuration commands, one per line. End with CNTL/Z.
switch-1(config)# device-alias database
switch-1(config-device-alias-db)# no device-alias name A3
switch-1(config-device-alias-db)# device-alias name A1 pwwn 21:01:01:01:01:01:01:02
Step 5 If there are more duplicate device-alias names, perform step Step 3, on page 168 and step Step 4, on page 168 to resolve
the duplicate device-alias names issue.
Step 6 Use the device-alias distribute command to enable the device-alias distribution and initiate a merge:
Step 7 Use the show cfs merge status name device-alias command to verify in the output if the merge was successful.
Procedure
Step 1 Review the CFS or device-alias merge failure syslog to confirm that the merge failed. Alternatively, run the show cfs
merge status name device-alias command to view the status of the merge.
Step 2 Use the show device-alias merge status command to verify that the reason for the merge failure is a mode mismatch.
If there is a mode mismatch, the reason that is displayed in the output is either "Databases could not be merged
due to mode mismatch" or "One of the merging fabrics cannot support device-alias
Enhanced mode."
Step 3 Use the show device-alias status command to verify the device-alias mode for each of the fabric.
In this example, switch-1 is running in Enhanced mode, while switch-2 is running in Basic mode:
Step 4 Use the no device-alias distribute command to disable device-alias distribution after you detect mismatched device-alias
modes.
Step 5 Depending on the mode you want to change in the switch, use the device-alias mode enhanced command to change to
enhanced mode, or use the no device-alias mode enhanced command to change the switch mode to basic mode.
Note
• Prior to Cisco MDS NX-OS Release 8.5(1), the default device alias mode was basic mode. From Cisco MDS NX-OS
Release 8.5(1), the default device alias mode is enhanced mode.
• If you want to change the device-alias mode from Enhanced to Basic, but an application contains a device-alias
configuration in the native format, the device-alias mode cannot be changed until you explicitly remove all the native
device-alias configurations or replace all the device-alias members with the corresponding pWWNs.
Step 6 Use the device-alias distribute command to enable the device-alias distribution and initiate a merge.
Procedure
Step 1 Review the CFS or device-alias merge failure syslog to confirm that the merge failed. Alternatively, run the show cfs
merge status name device-alias command to view the status of the merge.
Step 2 Use the show device-alias merge status command to verify that the reason for the merge failure is an application-validation
failure:
Result: Failure
Reason: This is a non device-alias error.
Step 3 Examine the syslog messages. The syslog for the switch in which the validation is rejected and the syslog for the switch
managing the merge show relevant error messages.
This example shows a sample message on a switch in which the validation is rejected:
This example shows the syslog message on a switch that is managing the merge, and in which the validation is rejected:
Step 4 Use the show device-alias internal validation-info command on the switch managing the merge, and examine the output.
This example shows that SAP 110 on switch 20:00:00:0d:ec:04:99:40 (switch-2) rejected the validation. The status
message shows the reason for the failure along with the system application number:
Step 5 Use the show system internal mts sup sap number description command to find the application that rejected the
configuration on the switch that rejected the validation.
In this example, the application that rejected the device-alias validation was the IVR process.
Step 6 Analyze the device-alias validation failure. This analysis is dependent on the application that failed the validation as well
as the device-alias database configuration.
In this example, IVR is failing the validation. To troubleshoot this problem, begin by reviewing the device-alias databases
that are being merged. Use the show device-alias database command from the switch managing the merge for each
fabric.
Prior to the database merge, device-alias A2 is not defined on switch-2. Because of the merge between switch-1 and
switch-2, device-alias A2 becomes available on switch-2, and A2 is mapped to pWWN 21:01:01:01:01:01:01:02.
The device alias-based member A2 in the IVR zone z1 is resolved and mapped to pWWN 21:01:01:01:01:01:01:02, and
is a member of VSAN 2. However, pWWN 21:01:01:01:01:01:01:02 is already a member of VSAN 1. The mapping that
occurs because of the device-alias merge makes the IVR configuration illegal. The same pWWN cannot be a member of
multiple VSANs.
In the case when IVR configuration is illegal, the pWWN in VSAN 2 is defined using the device alias (A2), while the
member in VSAN 1 is defined using the actual pWWN. The IVR detects this situation and rejects the device-alias
validation. As a result, the device-alias merge fails.
Procedure
Step 2 Determine which application configuration is in conflict with the device-alias database by reviewing the syslogs for the
switch in which the commit was issued.
This example shows that SAP 110 (IVR) on sWWN 20:00:00:0d:ec:04:99:40 (switch-2) has rejected the validation, and
therefore, the device-alias commit has failed:
Step 3 Review the syslog on the switch in which the validation is rejected.
This example shows that the following syslog is printed on switch-2:
Step 4 Compare the existing device-alias database (including the desired changes) and the application configuration to find the
conflict.
This example uses the show device-alias database and show ivr zoneset commands along with the console logs of the
device-alias database changes made prior to the commit. The comparison shows that the definition of the new device-alias
A2 results in the resolution of the enhanced device-alias member A2 in the IVR zone z1 to pWWN 21:01:01:01:01:01:01:02,
which is already a member of zone z1. The pWWN is directly defined as a member of VSAN 1, while the enhanced
device-alias A2 is defined as a member of VSAN 2. This configuration is not allowed in the IVR. The IVR detects the
configuration problem and rejects the device-alias database validation.
Step 5 Correct the conflict by making adjustments to the application configuration, or by making changes to the device-alias
database, and running the device-alias commit command again.
show cfs merge status name device-alias Displays information about the status of the CFS
merge for the device-alias database.
show device-alias internal validation info Displays information about the status of the validation
process (part of a commit or merge).
show device-alias merge conflicts Displays the device-alias names or pWWNs causing
a merge failure in Cisco MDS NX-OS Release 8.1(1)
and later releases.
show device-alias merge status Displays the result of the device-alias merge operation
and the reason for the result.
show device-alias session status Returns the status of the last CFS command, such as
clear, commit, or terminate. The results of the last
used CFS command and reason fields help identify
the reason for the failure.
About FSPF
FSPF is the protocol currently standardized by the T11 committee for routing in Fibre Channel networks. The
FSPF protocol has the following characteristics and features:
• Supports multipath routing.
• Bases path status on a link state protocol.
• Routes hop by hop, based only on the domain ID.
• Runs only on E ports or TE ports and provides a loop free topology.
• Runs on a per VSAN basis. Connectivity in a given VSAN in a fabric is guaranteed only for the switches
configured in that VSAN.
• Uses a topology database to keep track of the state of the links on all switches in the fabric and associates
a cost with each link.
• Guarantees a fast reconvergence time in case of a topology change. Uses the standard Dijkstra algorithm,
but there is a static dynamic option for a more robust, efficient, and incremental Dijkstra algorithm. The
reconvergence time is fast and efficient as the route computation is done on a per VSAN basis.
FSPF Examples
This section provides examples of topologies and applications that demonstrate the benefits of FSPF.
For example, if all links are of equal speed, the FSPF calculates two equal paths from A to C: A-D-C (green)
and A-E-C (blue).
Redundant Links
To further improve on the topology in Figure 44: Fault Tolerant Fabric, on page 176, each connection between
any pair of switches can be replicated; two or more links can be present between a pair of switches Figure 45:
Fault Tolerant Fabric with Redundant Links, on page 176 shows this arrangement. Because switches in the
Cisco MDS 9000 Family support PortChanneling, each pair of physical links can appear to the FSPF protocol
as one single logical link.
By bundling pairs of physical links, FSPF efficiency is considerably improved by the reduced database size
and the frequency of link updates. Once physical links are aggregated, failures are not attached to a single
link but to the entire PortChannel. This configuration also improves the resiliency of the network. The failure
of a link in a PortChannel does not trigger a route change, thereby reducing the risks of routing loops, traffic
loss, or fabric downtime for route reconfiguration.
Figure 45: Fault Tolerant Fabric with Redundant Links
For example, if all links are of equal speed and no PortChannels exist, the FSPF calculates four equal paths
from A to C: A1-E-C, A2-E-C, A3-D-C, and A4-D-C. If PortChannels exist, these paths are reduced to two.
Table 15: Physically Removing the Cable for the SmartBits Scenario
110 msec (~2K frame drops) 130+ msec (~4k frame drops)
100 msec (hold time when a signal loss is reported as mandated by the standard)
Table 16: Shutting Down the links in Switch for the SmartBits Scenario
~0 msec (~8 frame 110 msec (~2K frame drops) 130+ msec (~4K frame drops)
drops)
No hold time needed Signal loss on switch 1 No hold time needed Signal loss on switch 1
Note FSPF is enabled by default. Generally, you do not need to configure these advanced features.
Caution The default for the backbone region is 0 (zero). You do not need to change this setting unless your region is
different from the default. If you are operating with other vendors using the backbone region, you can change
this default to be compatible with those settings.
Acknowledgment interval 5 seconds The time a switch waits for an acknowledgment from
(RxmtInterval) the LSR before retransmission.
Refresh time (LSRefreshTime) 30 minutes The time a switch waits before sending an LSR refresh
transmission.
Maximum age (MaxAge) 60 minutes The time a switch waits before dropping the LSR from
the database.
The LSR minimum arrival time is the period between receiving LSR updates on this VSAN. Any LSR updates
that arrive before the LSR minimum arrival time are discarded.
The LSR minimum interval time is the frequency at which this switch sends LSR updates on a VSAN.
Procedure
switch(config)#
Enters configuration mode.
Procedure
Procedure
Procedure
Procedure
switch(config)#
Enters configuration mode.
Note The configuration of the FSPF Cost Multiplier is recommended to be done during a maintenance window, as
there could be traffic impact due to change in routes based on the new link costs.
Procedure
Procedure
Protocol constants :
LS_REFRESH_TIME = 30 minutes (1800 sec)
MAX_AGE = 60 minutes (3600 sec)
Statistics counters :
Number of LSR that reached MaxAge = 0
Number of SPF computations = 6
Number of Checksum Errors = 0
Number of Transmitted packets : LSU 30 LSA 32 Hello 984 Retransmitted LSU 0
Number of received packets : LSU 33 LSA 28 Hello 981 Error packets 3
Note This value must be the same in the ports at both ends of the ISL.
Procedure
Specifies the hello message interval (15 seconds) to verify the health of the link in VSAN 175. The default is 20 seconds.
Note This value must be the same in the ports at both ends of the ISL.
• An error is reported at the command prompt if the configured dead time interval is less than the hello
time interval
• During a software upgrade, ensure that the fspf dead-interval is greater than the ISSU downtime (80
seconds). If the fspf dead-interval is lesser than the ISSU downtime, the software upgrade fails and the
following error is displayed:
Service "fspf" returned error: Dead interval for interface is less than ISSU upgrade time.
Procedure
Note This value must be the same on the switches on both ends of the interface.
Procedure
Note FSPF must be enabled at both ends of the interface for the protocol to work.
Procedure
Procedure
FSPF Routes
FSPF routes traffic across the fabric, based on entries in the FSPF database. These routes can be learned
dynamically, or configured statically.
This section includes the following topics:
Note Other than in VSANs, runtime checks are not performed on configured and suspended static routes.
Caution All switches in the fabric should run the same multicast and broadcast distribution tree algorithm to ensure
the same distribution tree.
To interoperate with other vendor switches (following FC-SW3 guidelines), the SAN-OS and NX-OS 4.1(1b)
and later software uses the lowest domain switch as the root to compute the multicast tree in interop mode.
Note The operational mode can be different from the configured interop mode. The interop mode always uses the
lowest domain switch as the root.
Use the mcast root lowest vsan command to change the multicast root from the principal switch to lowest
domain switch.
Procedure
Load Balancing
Load balancing is a forwarding mechanism that distributes traffic over equal-cost multipath (ECMP) and port
channels. Load balancing uses a hash method to identify an egress link. The hash is a function that uses
parameters in the frame header to identify a unique link to forward the frame to. The load balancing scheme
used depends on both the type of ingress port and egress routing. If it is intended that traffic flow in both
directions on the same link, then ensure that the same load balancing scheme and hash method are used at
both ends of the link.
• Exchange based—The first frame in an exchange between a given source FCID and destination FCID
is used to select an egress link and subsequent frames in the exchange are transmitted on the same link.
However, subsequent exchanges between the source-destination pair will likely be transmitted on a
different link. This provides more granular load balancing while preserving the order of frames within
each exchange.
Figure 48: Flow Based Load Balancing, on page 189 illustrates how flow based load balancing works. In this
example, when the first frame with a source FCID of sid1 and destination FCID of did1 is received for
forwarding, port channel 2 is selected. Each subsequent frame in that flow is sent over the same port channel.
No frame from sid1 to did1 utilizes port channel 1. Similarly, all frames with sid2 and did2 are sent over port
channel 1. Exchange ID is not used with this type of load balancing.
Figure 48: Flow Based Load Balancing
Figure 49: Exchange Based Load Balancing, on page 189 illustrates how exchange based load balancing works.
In this example, when the first frame in an exchange between a source FCID sid1 and destination FCID did1
is received for forwarding, port channel 2 is selected. All remaining frames in that particular exchange are
sent on the same port channel and none are sent on port channel 1. For the next exchange, the hash algorithm
chooses port channel 1. So all frames in exchange 2 between the same source-destination pair are sent on port
channel 1.
Figure 49: Exchange Based Load Balancing
Hashing Methods
Load balancing is applied to an ingress frame at two levels—At the first level, an ECMP hash is used to select
an egress ECMP interface (this can be either a physical interface or logical interface such as a port channel
interface) and at the second level, a port channel hash is used to select an egress port channel member.
By default, the hash method that is used depends on the ingress hardware type. If either level of hash does
not apply to the egress route, then no hash method is applied.
The following types of hashing methods are supported:
• ECMP Hashing Method—If multiple paths to a destination with equal cost exist in the switch, the FIB
for the ingress port is updated with these paths for that destination. This hashing method is used to select
one of such paths to send frames to.
• Port Channel Hashing Method—This hashing method is used to select an operational interface of an
egress port channel.
Figure 50: ECMP Hashing Method, on page 190 illustrates how the ECMP hash method works. There are two
port channels each including two equal speed links. Since the FSPF costs of the port channels are the same,
both port channels are used for hashing. In this example, ECMP level hashing method selects port channel 2
as the egress port.
Figure 50: ECMP Hashing Method
Depending on the type of ingress port, the following subtypes of ECMP hashing methods are supported:
• Type 1a
• Type 1b
For information on which hashing method is selected for a given ingress port, see Table 18: Hashing Matrix,
on page 191.
Figure 51: Port Channel Hashing Method, on page 191 illustrates how port channel hashing method works.
Continuing the Figure 50: ECMP Hashing Method, on page 190 example where port channel 2 was selected
as the egress port, a port channel hash is subsequently applied to select an egress port within the port channel.
In this example, the frames are transmitted by interface 1/4 of the selected port channel.
Depending on the type of ingress port, the following types of port channel hashing methods are supported:
• Type 2a
• Type 2b
For information on which hashing method is selected for a given ingress port, see Table 18: Hashing Matrix,
on page 191.
Ingress Interface Egress Interface ECMP Hash Method Port Channel Hash
Method
Fibre Channel or FCIP Fibre Channel or FCIP Type 1a Type 2b (only when at
port on Cisco MDS 9500 ISL least one FCIP port is up)
with Generation 3 or 4
module
Ingress Interface Egress Interface ECMP Hash Method Port Channel Hash
Method
In-Order Delivery
In-Order Delivery (IOD) of data frames guarantees frame delivery to a destination in the same order that they
were sent by the originator.
Some Fibre Channel protocols or applications cannot handle out-of-order frame delivery. In these cases,
switches in the Cisco MDS 9000 Family preserve frame ordering in the frame flow. The source ID (SID),
destination ID (DID), and optionally the originator exchange ID (OX ID) identify the flow of the frame.
On any given switch with IOD enabled, all frames received by a specific ingress port and destined to a certain
egress port are always delivered in the same order in which they were received.
Use IOD only if your environment cannot support out-of-order frame delivery.
Tip If you enable the in-order delivery feature, the graceful shutdown feature is not implemented.
In Figure 52: Route Change Delivery, on page 193, the new path from Switch 1 to Switch 4 is faster. In this
scenario, Frame 3 and Frame 4 may be delivered before Frame 1 and Frame 2.
If the in-order guarantee feature is enabled, the frames within the network are treated as follows:
• Frames in the network are delivered in the order in which they are transmitted.
• Frames that cannot be delivered in order within the network latency drop period are dropped inside the
network.
In Figure 53: Link Congestion Delivery, on page 193 , the port of the old path (black dot) is congested. In this
scenario, Frame 3 and Frame 4 can be delivered before Frame 1 and Frame 2.
The in-order delivery feature attempts to minimize the number of frames dropped during PortChannel link
changes when the in-order delivery is enabled by sending a request to the remote switch on the PortChannel
to flush all frames for this PortChannel.
Note Both switches on the PortChannel must be running Cisco SAN-OS Release 3.0(1) for this IOD enhancement,
known as Lossless IOD. For earlier releases, IOD waits for the switch latency period before sending new
frames.
When the in-order delivery guarantee feature is enabled and a PortChannel link change occurs, the frames
crossing the PortChannel are treated as follows:
• Frames using the old path are delivered before new frames are accepted.
• The new frames are delivered through the new path after the switch latency drop period has elapsed and
all old frames are flushed.
Frames that cannot be delivered in order through the old path within the switch latency drop period are dropped.
See the Configuring the Drop Latency Time, on page 196.
Note Enabling or disabling the IOD feature does not disrupt traffic.
Tip We recommend that you only enable this feature when devices that cannot handle any out-of-order frames
are connected to the fabric. Load-balancing algorithms within the Cisco MDS 9000 Series ensure that frames
are delivered in order during normal fabric operation. The load-balancing algorithms based on source FC ID,
destination FC ID, and exchange ID are enforced in hardware without any performance degradation. However,
if the fabric encounters a failure and this feature is enabled, the recovery will be delayed because of an
intentional pausing of fabric forwarding to purge the fabric of resident frames that could potentially be
forwarded out-of-order.
Note Enable in-order delivery on the entire switch before performing a downgrade to Cisco MDS SAN-OS Release
1.3(3) or earlier.
Procedure
Procedure
Procedure
Note For each session, fcflow counter will increment only on locally connected devices and should be configured
on the switch where the initiator is connected.
Procedure
Procedure
Step 2 switch(config)# fcflow stats module 1 index 1 0x145601 0x5601ff 0xffffff vsan 1
switch(config)#
Enables the flow counter.
Note
The source ID and the destination ID are specified in FC ID hex format (for example, 0x123aff). The mask can be one
of 0xff0000 or 0xffffff.
Tip If the Min_LS_interval is higher than 10 seconds, the graceful shutdown feature is not implemented.
You could narrow the display to obtain specific information by issuing additional parameters for the domain
ID of the LSR owner. For each interface, the following information is also available:
• Domain ID of the neighboring switch
• E port index
• Port index of the neighboring switch
• Prior to Cisco MDS NX-OS Release 9.4(1), the Link type is numerical.
• From Cisco MDS NX-OS Release 9.4(1), the Link type is alphnumercial and the following types.
• Cost
Displays FSPF Database Information (Prior to Cisco MDS NX-OS Release 9.4(1))
Displays FSPF Database Information (From Cisco MDS NX-OS Release 9.4(1))
Default Settings
Table 20: Default FSPF Settings , on page 202 lists the default settings for FSPF features.
Parameters Default
Backbone region 0.
Distribution tree information Derived from the principal switch (root node).
Parameters Default
Static route cost If the cost (metric) of the route is not specified, the default is 10.
Remote destination switch If the remote destination switch is not specified, the default is
direct.
Multicast routing Uses the principal switch to compute the multicast tree.
About FLOGI
In a Fibre Channel fabric, each host or disk requires an Fibre Channel ID. Use the show flogi database
command to verify if a storage device is displayed in the FLOGI table as in the next section. If the required
device is displayed in the FLOGI table, the fabric login is successful. Examine the FLOGI database on a
switch that is directly connected to the host HBA and connected ports.
Name Server
The name server functionality maintains a database containing the attributes for all hosts and storage devices
in each VSAN. Name servers allow a database entry to be modified by a device that originally registered the
information.
The proxy feature is useful when you want to modify (update or delete) the contents of a database entry that
was previously registered by a different device.
This section includes the following topics:
Nearly 10 other components that receive this MTS notification would have to function on the single bulk
notification instead of multiple notifications.
Note From NX-OS Release 6.2(9) onwards, bulk notification is enabled by default.
Restrictions
• Whenever the intelligent applications such as the DMM, IOA, and SME are enabled, the bulk notification
feature is not supported.
• Any configuration present in the FC-Redirect, conflicts with the bulk notification feature.
To enable the name server bulk notification, follow these steps for NX-OS Release 6.2(1) to 6.2(7):
Procedure
Procedure
switch(config)#
Disables the transmission of multiple name server entry change notification in one Messaging and Transaction Services
(MTS) payload.
Procedure
Procedure
This authorization enables WWNs to register specific parameters for another node.
Procedure
Procedure
But you can still see the earlier entry in FLOGI database in the other switch.
Procedure
Procedure
port-ip-addr :0.0.0.0
fabric-port-wwn :00:00:00:00:00:00:00:00
hard-addr :0x000000
------------------------
VSAN:1 FCID:0xec0200
------------------------
port-wwn (vendor) :10:00:00:5a:c9:28:c7:01
node-wwn :10:00:00:5a:c9:28:c7:01
class :3
node-ip-addr :0.0.0.0
ipa :ff ff ff ff ff ff ff ff
fc4-types:fc4_features:
symbolic-port-name :
symbolic-node-name :
port-type :N
port-ip-addr :0.0.0.0
fabric-port-wwn :22:0a:00:05:30:00:26:1e
hard-addr :0x000000
Total number of entries = 2
FDMI
Cisco MDS 9000 Family switches provide support for the Fabric-Device Management Interface (FDMI)
functionality, as described in the FC-GS-4 standard. FDMI enables management of devices such as Fibre
Channel host bus adapters (HBAs) through in-band communications. This addition complements the existing
Fibre Channel name server and management server functions.
Using the FDMI functionality, the Cisco NX-OS software can extract the following management information
about attached HBAs and host operating systems without installing proprietary host agents:
• Manufacturer, model, and serial number
• Node name and node symbolic name
• Hardware, driver, and firmware versions
• Host operating system (OS) name and version number
FDMI is compatible with both physical and virtual end devices. The number of registered virtual devices is
as follows:
• Prior to Cisco MDS NX-OS 9.4(2), the maximum limit was 255 virtual devices per HBA end device.
• FromCisco MDS NX-OS 9.4(2), the maximum limit is 32 virtual devices per HBA end device.
Displaying FDMI
Use the show fdmi command to display the FDMI database information.
Displays All HBA Management Servers prior to Cisco MDS NX-OS Release 9.4(2)
Display all registered end devices including virtual end device information from Cisco MDS NX-OS
Release 9.4(2)
RSCN
The Registered State Change Notification (RSCN) is a Fibre Channel service that informs hosts about changes
in the fabric. Hosts can receive this information by registering with the fabric controller (through SCR). These
notifications provide a timely indication of one or more of the following events:
• Disks joining or leaving the fabric.
• A name server registration change.
• A new zone enforcement.
• IP address change.
• Any other similar event that affects the operation of the host.
This section includes the following topics:
Note The switch sends an RSCN to notify registered nodes that a change has occurred. It is up to the nodes to query
the name server again to obtain the new information. The details of the changed information are not delivered
by the switch in the RSCN sent to the nodes.
Note The SCR table is not configurable. It is populated when hosts send SCR frames with RSCN
information. If hosts do not receive RSCN information, then the show rscn scr-table command will
not return entries.
multi-pid Option
If the RSCN multi-pid option is enabled, then RSCNs generated to the registered Nx ports may contain more
than one affected port IDs. In this case, zoning rules are applied before putting the multiple affected port IDs
together in a single RSCN. By enabling this option, you can reduce the number of RSCNs. For example:
Suppose you have two disks (D1, D2) and a host (H) connected to switch 1. Host H is registered to receive
RSCNs. D1, D2 and H belong to the same zone. If disks D1 and D2 are online at the same time, then one of
the following applies:
• The multi-pid option is disabled on switch 1: two RSCNs are generated to host H—one for the disk D1
and another for disk D2.
• The multi-pid option is enabled on switch 1: a single RSCN is generated to host H, and the RSCN
payload lists the affected port IDs (in this case, both D1 and D2).
Note Some Nx ports may not understand multi-pid RSCN payloads. If not, disable the RSCN multi-pid option.
Procedure
Procedure
Coalesced SW-RSCN
In order to improve the performance of the Fibre Channel protocols on the Cisco MDS 9000 switch, SW-RSCNs
are delayed, collected and sent as a single coalesced SW-RSCN to all the switches in the fabric in a single
Fibre Channel exchange.
• All the switches in the fabric should be running Cisco MDS 6.2(7) and above.
• This feature does not have interoperability with non-Cisco MDS switches.
To enable the coalesced SW-RSCNs, follow these step:
Procedure
Procedure
After clearing the RSCN statistics, you can view the cleared counters by issuing the show rscn command.
Note All configuration commands are not distributed. Only the rscn event-tov tov vsan vsan command is distributed.
The RSCN timer is registered with CFS during initialization and switchover. For high availability, if the
RSCN timer distribution crashes and restarts or a switchover occurs, it resumes normal functionality from the
state prior to the crash or switchover.
Note Before performing a downgrade, make sure that you revert the RCSN timer value in your network to the
default value. Failure to do so will disable the links across your VSANs and other devices.
Compatibility across various Cisco MDS NX-OS releases during an upgrade or downgrade is supported by
conf-check provided by CFS. If you attempt to downgrade from Cisco MDS SAN-OS Release 3.0, you are
prompted with a conf-check warning. You are required to disable RSCN timer distribution support before
you downgrade.
By default, the RSCN timer distribution capability is disabled and is therefore compatible when upgrading
from any Cisco MDS SAN-OS release earlier than Release 3.0.
Note The RSCN timer value must be the same on all switches in the VSAN. See the RSCN Timer Configuration
Distribution, on page 221.
Note Before performing a downgrade, make sure that you revert the RCSN timer value in your network to the
default value. Failure to do so will disable the links across your VSANs and other devices.
Procedure
Reverts to the default value (2000 milliseconds for Fibre Channel VSANs or 1000 milliseconds for FICON VSANs).
Note All configuration commands are not distributed. Only the rscn event-tov tov vsan vsan command is distributed.
The RSCN timer is registered with CFS during initialization and switchover. For high availability, if the
RSCN timer distribution crashes and restarts or a switchover occurs, it resumes normal functionality from the
state prior to the crash or switchover.
Note You can determine the compatibility when downgrading to an earlier Cisco MDS NX-OS release using show
incompatibility system command. You must disable RSCN timer distribution support before downgrading
to an earlier release.
Note By default, the RSCN timer distribution capability is disabled and is compatible when upgrading from any
Cisco MDS SAN-OS release earlier than 3.0.
Note For CFS distribution to operate correctly for the RSCN timer configuration, all switches in the fabric must
be running Cisco SAN-OS Release 3.0(1) or later, or Cisco NX-OS 4.1(1b).
Procedure
Procedure
Procedure
Tip The pending database is only available in the volatile directory and are subject to being discarded if the switch
is restarted.
To use administrative privileges and release a locked DPVM session, use the clear rscn session vsan command
in EXEC mode.
Use the show rscn session status vsan command to display session status information for RSCN configuration
distribution.
Note A merge failure results when the RSCN timer values are different on the merging fabrics.
Use the show rscn pending command to display the set of configuration commands that would take effect
when you commit the configuration.
Note The pending database includes both existing and modified configuration.
Use the show rscn pending-diff command to display the difference between pending and active configurations.
The following example shows the time-out value for VSAN 10 was changed from 2000 milliseconds (default)
to 300 milliseconds.
Default Settings
Table 21: Default RSCN Settings , on page 224 lists the default settings for RSCN.
Parameters Default
RSCN timer value 2000 milliseconds for Fibre Channel VSANs1000 milliseconds for
FICON VSANs
Procedure
discovery started
Discovers local SCSI targets for all operating systems (OS). The operating system options are aix, all, hpux, linux,
solaris, or windows
discovery started
Discovers SCSI targets for the specified VSAN (1) and FC ID (0x9c03d6).
discovery started
Discovers SCSI targets from the customized list assigned to the Linux OS.
Procedure
Note This command takes several minutes to complete, especially if the fabric is large or if several devices
are slow to respond.
The following command displays the port WWN that is assigned to each OS (Windows, AIX, Solaris,
Linux, or HPUX)
AIX 24:92:00:05:30:00:2a:1e
SOL 24:93:00:05:30:00:2a:1e
LIN 24:94:00:05:30:00:2a:1e
HP 24:95:00:05:30:00:2a:1e
Use the show scsi-target auto-poll command to verify automatic discovery of SCSI targets that
come online. The internal uuid number indicates that a CSM or an IPS module is in the chassis.
---------------------
About FICON
The Cisco MDS 9000 Family supports the Fibre Channel Protocol (FCP), FICON, iSCSI, NVMe, and FCIP
capabilities within a single, high-availability platform (see Figure 54: Shared System Storage Network, on
page 232).
The FICON feature is supported only with the following platforms:
• Cisco MDS 9710 switches
• Cisco MDS 9706 switches
• Cisco MDS 9250i switches
• Cisco MDS 9220i switches
• Cisco MDS 9148V switches
FCP, NVMe, and FICON are different FC4 protocols and their traffic is independent of each other. Devices
using these protocols should be isolated using VSANs.
The fabric binding feature helps prevent unauthorized switches from joining the fabric or disrupting current
fabric operations (see the Cisco MDS 9000 Series Security Configuration Guide). The Registered Link Incident
Report (RLIR) application provides a method for a switch port to send an LIR to a registered Nx port.
Figure 54: Shared System Storage Network
FICON Requirements
The FICON feature has the following requirements:
• You can implement FICON features in the following switches:
• Cisco MDS 9706 and MDS 9710 switches
• Cisco MDS 9250i and MDS 9220i switches
Although in earlier releases the MAINFRAME_PKG license was required to configure FICON, beginning
with NX-OS Release 9.4(1a), the FICON feature is a base feature of NX-OS and no special license is required.
also help you to move unused ports nondisruptively and provide a common redundant physical infrastructure
(see Figure 55: VSAN-Specific Fabric Optimization, on page 233).
Figure 55: VSAN-Specific Fabric Optimization
VSANs enable global SAN consolidation by allowing you to convert existing SAN islands into virtual SAN
islands on a single physical network. It provides hardware-enforced security and separation between applications
or departments to allow coexistence on a single network. It also allows virtual rewiring to consolidate your
storage infrastructure. You can move assets between departments or applications without the expense and
disruption of physical relocation of equipment.
Note While you can configure VSANs in any Cisco MDS switch, you can only enable FICON in up to eight of
these VSANs on switches that support the FICON feature.
Mainframe users can think of VSANs as being like FICON LPARs in the MDS SAN fabric. You can partition
switch resources into FICON LPARs (VSANs) that are isolated from each other, in much the same way that
you can partition resources on an IBM Z Systems mainframe server. Each VSAN has its own set of fabric
services (such as fabric server, name server, and zone server), FICON CUP, domain ID, Fabric Shortest Path
First (FSPF) routing, operating mode, and security profile. FICON VSANs can span line cards and are dynamic
in size. For example, one FICON VSAN with 8 ports can span 8 different line cards. FICON VSANs can also
include ports on more than one switch in a cascaded configuration. The consistent fairness of the Cisco MDS
9000 switching architecture means that “all ports are created equal,” simplifying provisioning by eliminating
the “local switching” issues seen on other vendors’ platforms. Addition of ports to a FICON VSAN is a
nondisruptive process. The maximum number of ports for a FICON VSAN is 254 per switch due to FICON
addressing limitations.
FCIP Support
The multilayer architecture of the Cisco MDS 9000 Family enables a consistent feature set over
protocol-agnostic switch fabric. Cisco MDS 9700 Series and 9200 Series switches transparently integrate
FCP, NVMe, FICON, and Fibre Channel over IP (FCIP) in one system. The FICON over FCIP feature enables
cost-effective access to remotely located mainframe resources. With the Cisco MDS 9000 Family platform,
storage replication services such as IBM PPRC can be extended over metro to global distances using ubiquitous
IP infrastructure which simplifies business continuance strategies.
For more information, see the Cisco MDS 9000 Series IP Services Configuration Guide.
PortChannel Support
The Cisco MDS implementation of FICON provides support for efficient utilization and increased availability
of Inter-Switch Links (ISLs) necessary to build stable large-scale SAN environments. PortChannels ensure
an enhanced ISL availability and performance in Cisco MDS switches.
Refer to the Cisco MDS 9000 Series Interfaces Configuration Guide for more information on PortChannels.
Tip When creating a mixed environment, place all FICON devices in one VSAN (other than the default VSAN)
and segregate the FCP switch ports in a separate VSAN (other than the default VSAN). This isolation ensures
proper communication for all connected devices. The default VSAN (VSAN 1) should never be used for
production services.
See the Cisco MDS 9700 Series Multilayer Director Hardware Installation Guide, the Cisco MDS 9250i
Multiservice Fabric Switch Hardware Installation Guide, and the Cisco MDS 9220i Fabric Switch
Hardware Installation Guide.
• High-availability FICON-enabled director — Cisco MDS 9700 Series combines nondisruptive software
upgrades, stateful process restart and failover, and full redundancy of all major components for a new
standard in director-class availability. The Cisco MDS 9710 supports up to 384 autosensing,
64/32/16/10/8/4/2-Gbps Fibre Channel ports for FCP, NVMe, and FICON connections as well as
1/10/25/40 Gbps IP Services ports for FCIP links. The Cisco MDS 9706 supports up to 192 autosensing,
64/32/16/10/8/4/2-Gbps Fibre Channel ports for FCP, NVMe, and FICON connections as well as
1/10/25/40 Gbps IP Services ports for FCIP links. See the Cisco MDS 9000 Series High Availability
Configuration Guide.
• Infrastructure protection — Common software releases provide infrastructure protection across all Cisco
MDS 9000 platforms. See the Cisco MDS 9000 NX-OS Software Upgrade and Downgrade Guide.
• VSAN technology — Cisco MDS 9000 Family provides VSAN technology for hardware-enforced,
isolated environments within a single physical fabric for secure sharing of physical infrastructure and
enhanced FICON mixed support. See Configuring and Managing VSANs, on page 7
• Port-level configurations — There are BB credits, beacon mode, and port security for each port. See the
Cisco MDS 9000 Series Interfaces Configuration Guide for information about buffer-to-buffer credits,
beacon LEDs, and trunking.
• Alias name configuration — Provides user-friendly aliases instead of the WWN for switches and attached
node devices. See the Configuring and Managing Zones, on page 37.
• Comprehensive security framework — Cisco MDS 9000 Family supports RADIUS and TACACS+
authentication, Simple Network Management Protocol Version 3 (SNMPv3), role-based access control,
Secure Shell Protocol (SSH), Secure File Transfer Protocol (SFTP), VSANs, hardware-enforced zoning,
ACLs, fabric binding, Fibre Channel Security Protocol (FC-SP), LUN zoning, read-only zones, and
VSAN-based access control. See the Cisco MDS 9000 Series Security Configuration Guide for information
about RADIUS, TACACS+, FC-SP, and DHCHAP.
• Traffic encryption — IPSec is supported over FCIP. You can encrypt FICON, FCP, and NVMe traffic
that is carried over FCIP. See the Cisco MDS 9000 Series Comprehensive security framework Security
Configuration Guide.
• Local accounting log — View the local accounting log to locate FICON events. For more information
about MSCHAP authentication, and local AAA services, see the Cisco MDS 9000 Family NX-OS Security
Configuration Guide.
• Unified storage management — Cisco MDS 9000 FICON-enabled switches are fully IBM CUP standard
compliant for FICON in-band communications with the IBM Z Systems mainframe server. See the CUP
In-Band Management, on page 269.
• Port address-based configurations — FICON port name attribute can be configured for ports in FICON
VSANs. See the Configuring FICON Ports, on page 255.
• You can display the following information:
• Individual Fibre Channel ports, such as the port name, port number, Fibre Channel address,
operational state, type of port, and login data.
• Nodes attached to ports.
• Port performance and statistics.
• Configuration files — Store and apply configuration files. See the FICON Configuration Files, on page
262.
• FICON and Open Systems Management Server features if installed. —See the VSANs for FICON and
FCP Mixing, on page 234.
• Enhanced cascading support—See the CUP In-Band Management, on page 269.
• Date and time — Enable the IBM Z Systems Server to set the date and time for FICON VSANs on the
switch. See the Allowing the Host to Control the Timestamp , on page 251.
• Configure SNMP trap recipients and community names — See the Configuring SNMP Control of FICON
Parameters, on page 252.
• Call Home configurations — Configure the director name, location, description, and contact person. See
the Cisco MDS 9000 Series System Management Configuration Guide.
• Configure preferred domain ID, FC ID persistence, and principal switch priority — For information
about configuring domain parameters, see the Cisco MDS 9000 Series System Management Configuration
Guide.
• Sophisticated SPAN diagnostics — Cisco MDS 9000 Family provides industry-first intelligent diagnostics,
protocol decoding, and network analysis tools as well as integrated Call Home capability for added
reliability, faster problem resolution, and reduced service costs. For information about monitoring network
traffic using SPAN, see the Cisco MDS 9000 Series System Management Configuration Guide.
• Configure R_A_TOV, E_D_TOV — See the Cisco MDS 9000-Supported FICON Features.
• Director-level maintenance tasks—Perform maintenance tasks for the director including maintaining
firmware levels, accessing the director logs, and collecting data to support failure analysis. For information
about monitoring system processes and logs refer to the Cisco MDS 9000 Series System Management
Configuration Guide
• Port-level incident alerts—Display and clear port-level incident alerts. See the Clearing RLIR Information,
on page 261.
FICON Cascading
The Cisco MDS NX-OS software allows multiple switches in a FICON network. To configure multiple
switches, you must enable and configure fabric binding in each switch. See the Cisco MDS 9000 Series Security
Configuration Guide).
The FICON topologies supported on the Cisco MDS 9000 Series switches are:
• Single hop/traditional cascade – This topology has two switches with a single hop (or set of ISLs
between the switches. This support has been around since the introduction of FICON support in 2004.
• Multi-hop cascade – This topology allows for up to four (4) switches between the host channels and
their associated control units. The ISLs between these switches can be fibre channel ISLs, port channels
made of fibre channel ISLs, FCIP ISLs, or port channels made of FCIP ISLs. Multi-hop cascade was
introduced in approximately 2017 and begins with the z13 System Z server forward.
If any of these requirements are not met, the FICON feature cannot be enabled.
Note You must enable the FICON feature on the switch assigning FICON port numbers (see the About Enabling
FICON on a VSAN, on page 244).
Figure 56: Default FICON Port Number in Numbering on the Cisco MDS 9000 Family Switch
The default FICON port numbering is assigned based on the front panel location of the port and is specific
to the slot in which the module resides. Forty-eight (48) port numbers are assigned to each slot on all Cisco
MDS 9000 Family switches. These default numbers are assigned regardless of the module’s physical presence
in the chassis, the port status (up or down), or the number of ports on the module (24 or 48). If a module has
fewer ports than the number of port numbers assigned to the slot, then the excess port numbers are unused.
If a module has more ports than the number of port numbers assigned to the slot, the excess ports cannot be
used for FICON traffic unless you manually assign the port numbers.
Note You can use the ficon slot assign port-numbers command to make use of excess ports mapped to a slot by
default that are not addressable due to the module not having ports for them by manually assigning more port
numbers to other slots. Before doing this, however, we recommend that you review the default port number
assignments for Cisco MDS 9000 switches shown in Table 24: Default FICON Settings , on page 275 and
Table 22: Default FICON Port Numbering in the Cisco MDS 9000 Family, on page 239, and that you read the
following sections to gain a complete understanding of FICON port numbering: About the Reserved FICON
Port Numbering Scheme, on page 240, FICON Port Numbering Guidelines, on page 241, and Assigning FICON
Port Numbers to Slots, on page 241.
Note Only Fibre Channel, Port Channel, and FCIP ports are mapped to FICON port numbers. Other types of
interfaces do not have a corresponding port number.
The following table lists the default port number assignment for the Cisco MDS 9000 Family of switches and
directors.
Table 22: Default FICON Port Numbering in the Cisco MDS 9000 Family
Cisco MDS 9250i Slot 1 0 through 39 240 through 253 254 through 255
Series
Cisco MDS 9220i Slot 1 0 through 11 240 through 253 254 through 255
Series
Cisco MDS 9710 Slot 1 0 through 47 240 through 253 254 through 255
Director
Slot 2 48 through 95
Slot 5 - None
Supervisor
Slot 6 - None
Supervisor
Slot 8 None
Slot 9 None
Slot 10 None
Cisco MDS 9706 Slot 1 0 through 47 240 through 253 254 through 255
Slot 2 48 through 95
Slot 3 – None
Supervisor
Slot 4 – None
Supervisor
Port Addresses
Following the deprecation of FICON Port Swap in NX-OS 9.4(1a), the port address is always the same as the
port number.
Note A VSAN can have a maximum of 254 port numbers (0-253) and always has the FICON CUP device with
port number 254 (0xFE).
Note FICON port numbers are not changed for ports that are active. You must first disable the interfaces using the
shutdown command.
Note You can configure port numbers even when no module is installed in the slot.
• The port is part of a PortChannel—For example, if interface fc 1/1 is part of PortChanne1 5, port address
0 is uninstalled in all FICON VSANs. See Default Settings, on page 275.
See the About Port Numbers for FCIP and PortChannel, on page 242.
Caution When you assign, change, or release a port number, the port reloads.
Procedure
Reserves FICON port numbers 0 through 15 and 48 through 63 for up to 32 interfaces in slot 3.
If there are more interfaces in slot 3, they are not usable for FICON with this configuration.
Use the show ficon port-numbers assign slot command to display the port numbers assigned to a specific
slot.
Use the show ficon port-numbers assign command to display the port numbers reserved for logical ports.
To find the first available port number to bind an FCIP or PortChannel interface, use the show ficon
first-available port-number command (see Displays the Available Port Numbers, on page 271).
Tip The show ficon vsan portaddress brief command displays the port number to interface mapping. You can
assign port numbers in the PortChannel/FCIP range that are not already assigned to a PortChannel or FCIP
interface (see Displays Port Address Information in a Brief Format, on page 271).
Procedure
FC ID Allocation
FICON requires a predictable and static FC ID allocation scheme. When FICON is enabled, the FC ID allocated
to a device is based on the port address of the port to which it is attached. The port address forms the middle
byte of the fabric address. Additionally, the last byte of the fabric address should be the same for all devices
in the fabric. By default, the last byte value is 0 and can be configured.
Note As the domain ID for FICON VSANs must be static, you cannot configure persistent FC IDs in FICON-enabled
VSANs.
Cisco MDS switches have a dynamic FC ID allocation scheme. When FICON is enabled or disabled on a
VSAN,all the ports are shut down and restarted to switch from the default dynamic allocation scheme to use
static FC IDs and vice versa (see Figure 57: Static FC ID Allocation for FICON, on page 244).
Figure 57: Static FC ID Allocation for FICON
Configuring FICON
By default FICON is disabled in all switches in the Cisco MDS 9000 Family. You can enable FICON on a
per VSAN basis by using the Device Manager.
This section includes the following topics:
Tip Using Device Manager, FICON auto-save can be invoked by multiple users logged on to the same
FICON-enabled switch. Device Manager performs a periodic auto-save on any FICON-enabled switch causing
increments in the FICON key counter. These increments highlight a change that has actually not occurred.
To avoid this we recommend that only one instance of Device Manager monitor a FICON-enabled switch.
Procedure
Note Press Ctrl-C at any prompt to skip the remaining configuration options and proceed with what is configured
until that point.
Tip If you do not want to answer a previously configured question, or if you want to skip answers to any questions,
press Enter. If a default answer is not available (for example, switch name), the switch uses what was previously
configured and skips to the next question.
Procedure
Step 1 Enter the setup ficon command at the EXEC command mode.
Step 2 Enter yes (the default is yes) to enter the basic FICON configuration setup.
Would you like to enter the basic configuration dialog (yes/no) [yes]: yes
The FICON setup utility guides you through the basic configuration process. Press Ctrl-C at any prompt to end the
configuration process.
Step 3 Enter the VSAN number for which FICON should be enabled.
Step 5 Enter yes (the default is yes) to confirm your VSAN choice:
Note
At this point, the software creates the VSAN if it does not already exist.
Step 6 Enter the domain ID number for the specified FICON VSAN.
Step 7 Enter yes (the default is no) to set up FICON in cascaded mode. If you enter no, skip to step 8 (see the CUP In-Band
Management, on page 269).
Would you like to configure ficon in cascaded mode: (yes/no) [no]: yes
c) Enter yes if you wish to configure additional peers (and repeat Steps 7a and 7b). Enter no, if you do wish to configure
additional peers.
Step 8 Enter yes (the default is yes) to allow SNMP permission to modify existing port connectivity parameters (see the
Configuring SNMP Control of FICON Parameters, on page 252).
Step 9 Enter no (the default is no) to allow the host (mainframe) to modify the port connectivity parameters, if required (see
the Allowing the Host to Change FICON Port Parameters, on page 251).
Step 10 Enter yes (the default is yes) to enable the active equals saved feature (see the Automatically Saving the Running
Configuration, on page 253).
Enable active=saved? (yes/no) [yes]: yes
Step 11 Enter yes (the default is yes) if you wish to configure additional FICON VSANs.
Would you like to configure additional ficon vsans (yes/no) [yes]: no
Step 12 Review and edit the configuration that you have just entered.
Step 13 Enter no (the default is no) if you are satisfied with the configuration.
Note
For documentation purposes, the following configurations shows three VSANs with different FICON settings. These
settings provide a sample output for different FICON scenarios.
The following configuration will be applied:
fcdomain domain 2 static vsan 2
fcdomain restart disruptive vsan 2
fabric-binding database vsan 2
swwn 11:00:02:01:aa:bb:cc:00 domain 4
fabric-binding activate vsan 2
zone default-zone permit vsan 2
ficon vsan 2
no host port control
fcdomain domain 3 static vsan 3
fcdomain restart disruptive vsan 3
fabric-binding activate vsan 3 force
zone default-zone permit vsan 3
ficon vsan 3
no host port control
no active equals saved
vsan database
vsan 4
fcdomain domain 5 static vsan 4
fcdomain restart disruptive vsan 4
fabric-binding activate vsan 4 force
Step 14 Enter yes (the default is yes) to use and save this configuration. The implemented commands are displayed. After
FICON is enabled for the specified VSAN, you are returned to the EXEC mode switch prompt.
Use this configuration and apply it? (yes/no) [yes]: yes
`fcdomain domain 2 static vsan 2`
`fcdomain restart disruptive vsan 2`
`fabric-binding database vsan 2`
`swwn 11:00:02:01:aa:bb:cc:00 domain 4`
`fabric-binding activate vsan 2`
`zone default-zone permit vsan 2`
`ficon vsan 2`
`no host port control`
`fcdomain domain 3 static vsan 3`
`fcdomain restart disruptive vsan 3`
`fabric-binding activate vsan 3 force`
`zone default-zone permit vsan 3`
`ficon vsan 3`
`no host port control`
`no active equals saved`
Note
If a new VSAN is created, two additional commands are displayed— vsan database and vsan number.
`vsan database`
`vsan 4`
`in-order-guarantee vsan 4`
`fcdomain domain 2 static vsan 4`
`fcdomain restart disruptive vsan 4`
`fabric-binding activate vsan 4 force`
`zone default-zone permit vsan 4`
`ficon vsan 4`
`no snmp port control`
Performing fast copy config...done. switch#
Note This section describes the procedure to manually enable FICON on a VSAN. If you have already enabled
FICON on the required VSAN using the automated setup (recommended), skip to the Automatically Saving
the Running Configuration, on page 253.
Procedure
switch(config)#
switch(config-vsan-db)# vsan 5
switch(config-vsan-db)# show vsan usage
4 vsan configured
configured vsans:1-2,5,26
vsans available for configuration:3-4,6-25,27-4093
switch(config-vsan-db)# exit
Enables VSAN 5.
Tip This is an optional configuration. If you are not sure of the EBCDIC format to be used, we recommend
retaining the us-canada (default) option.
Procedure
Procedure
Procedure
computes the difference between the VSAN-clock and the current director hardware clock and presents a
value to the mainframe.
The VSAN-clock current time is reported in the output of show ficon vsan vsan-id, show ficon, and show
accounting log commands.
To configure host control of the timestamp, follow these steps:
Procedure
Note You can clear time stamps only from the Cisco MDS switch—not the mainframe.
Use the clear ficon vsan vsan-id timestamp command in EXEC mode to clear the VSAN clock.
Procedure
If the Active=Saved option active equals saved command is not enabled in any FICON-enabled VSAN in
the fabric, then FICON-specific configuration changes are not saved in the IPL file and an implicit copy
running startup command is not issued, you must explicitly save the running configuration to the startup
configuration. Use the copy running start command explicitly (see number 3 in Table 23: Saving the Active
FICON and Switch Configuration , on page 254).
1 Yes Yes (in all FICON VSANs) Implicit FICON changes written to the IPL file.
Non-FICON changes saved to startup configuration
and persistent storage.
2 Yes Yes (even in one FICON Implicit FICON changes written to IPL file for only the VSAN
VSAN) that has active equals saved option enabled.
Non-FICON changes saved to startup configuration
and persistent storage.
3 Yes Not in any FICON VSAN Not implicit FICON changes are not written to the IPL file.
Non-FICON changes are saved in persistent
storage—only if you explicitly issue the copy
running start command.
4 No Not applicable — —
Note If active equals saved is enabled, the Cisco NX-OS software ensures that you do not have to perform the
copy running startup command for the FICON configuration as well. If your switch or fabric consists of
multiple FICON-enabled VSANs, and one of these VSANs have active equals saved enabled, changes made
to the non-FICON configuration results in all configurations being saved to the startup configuration.
Procedure
Caution All port number assignments to PortChannels or FCIP interfaces are lost (cannot be retrieved) when FICON
is disabled on all VSANs.
You can bind (or associate) a PortChannel with a FICON port number to bring up that interface.
To bind a PortChannel with a FICON port number, follow these steps:
Procedure
Procedure
Port Prohibiting
FICON Port Prohibit attribute has been deprecated from NX-OS Release NX-OS 9.4(1a). If specific port to
port protections are desired within FICON VSANs (above the protections implicitly given by the static routing
nature of the System Z HCD configuration), zoning can be used.
Procedure
About RLIR
The Registered Link Incident Report (RLIR) application provides a method for a switch port to send an Link
Incident Record (LIR) to a registered Nx port.
When an LIR is detected in FICON-enabled switches in the Cisco MDS 9000 Family from a RLIR Extended
Link Service (ELS), the switch sends that record to the members in its Established Registration List (ERL).
In case of multiswitch topology, a Distribute Registered Link Incident Record (DRLIR) Inter-Link Service
(ILS) is sent to all reachable remote domains along with the RLIR ELS. On receiving the DRLIR ILS, the
switch extracts the RLIR ELS and sends it to the members of the ERL.
The Nx ports interested in receiving the RLIR ELS send the Link Incident Record Registration (LIRR) ELS
request to the management server on the switch. The RLIRs are processed on a per-VSAN basis.
The RLIR data is written to persistent storage when you enter the copy running-config startup-config
command.
The RLIR data is written to persistent storage when you copy the running configuration to the startup
configuration.
Note If all registered hosts have the registration function set to “conditionally receive,” then the preferred host
receives the RLIR frames.
You can specify only one RLIR preferred host per VSAN. By default, the switch sends RLIR frames to one
of the hosts in the VSAN with the register function set to “conditionally receive” if no hosts have the register
function set to “always receive.”
To specify the RLIR preferred host for a VSAN, follow these steps:
Procedure
Example
To display the RLIR preferred host configuration, use the show rlir erl command.
The show rlir erl command shows the list of Nx ports that are registered to receive the RLIRs with
the switch. If the VSAN ID is not specified, the details are shown for all active VSANs (see Examples
Displays All ERLs, on page 260 and Displays ERLs for the Specified VSAN, on page 260).
In Displays All ERLs, on page 260, if the Registered For column states that an FC ID is conditional
receive, the source port is registered as a valid recipient of subsequent RLIRs. This source port is
selected as an RLIR recipient only if no other ERL recipient is selected.
In Displays All ERLs, on page 260, if the Registered For column states that an FC ID is always
receive, the source port is registered as a valid recipient of subsequent RLIRs. This source port is
always selected as an LIR recipient.
Note If an always receive RLIR is not registered for any N port or if the delivery of an RLIR fails for one
of those ports, then the RLIR is sent to a port registered to conditional receive RLIRs.
Host Time Stamp Switch Time Stamp VSAN Domain Port Intf Link
Incident Loc/Rem
----------------------------------------------------------------------------------------------------------------
Sep 20 12:42:44 2006 Sep 20 12:42:44 2006 **** **** 0x0b fc1/12 Loss
of sig/sync LOC
Reported Successfully to: [0x640001] [0x640201]
Sep 20 12:42:48 2006 Sep 20 12:42:48 2006 **** **** 0x0b fc1/12 Loss
of sig/sync LOC
Reported Successfully to: [0x640001] [0x640201]
*** ** **:**:** **** Sep 20 12:42:51 2006 1001 230 0x12 **** Loss
of sig/sync REM
Reported Successfully to: [0x640001] [0x640201]
Sep 20 12:42:55 2006 Sep 20 12:42:55 2006 **** **** 0x0b fc1/12 Loss
of sig/sync LOC
Reported Successfully to: None [No Registrations]
*** ** **:**:** **** Sep 20 12:45:56 2006 1001 230 0x12 **** Loss
of sig/sync REM
Reported Successfully to: None [No Registrations]
*** ** **:**:** **** Sep 20 12:45:56 2006 1001 230 0x12 **** Loss
of sig/sync REM
Reported Successfully to: None [No Registrations]
Sep 20 12:52:45 2006 Sep 20 12:52:45 2006 **** **** 0x0b fc1/12 Loss
of sig/sync LOC
Reported Successfully to: None [No Registrations]
**** - Info not required/unavailable
switch#
clear rlir statistics vsan 2
Use the clear rlir history command to clear the RLIR history where all link incident records are logged for
all interfaces.
Use the clear rlir recent interface command to clear the most recent RLIR information for a specified
interface.
Use the clear rlir recent portnumber command to clear the most recent RLIR information for a specified
port number.
Note Multiple FICON configuration files with the same name can exist in the same switch, provided they reside
in different VSANs. For example, you can create a configuration file named XYZ in both VSAN 2 and VSAN
3.
When you enable the FICON feature in a VSAN, the switches always use the startup FICON configuration
file, called IPL. This file is created with a default configuration as soon as FICON is enabled in a VSAN.
Caution When FICON is disabled on a VSAN, all the FICON configuration files are irretrievably lost.
FICON configuration files contain the following configuration for each implemented port address:
• Port address name
Note Normal configuration files used by Cisco MDS switches include FICON-enabled attributes for a VSAN, port
number mapping for PortChannels and FCIP interfaces, port number to port address mapping, port and trunk
allowed VSAN configuration for ports, in-order guarantee, static domain ID configuration, and fabric binding
configuration.
Refer to the Cisco MDS 9000 Series Fundamentals Configuration Guide for details on the normal configuration
files used by Cisco MDS switches.
This section includes the following topics:
FICON configuration files can be accessed by any host, SNMP, or CLI user who is permitted to access the
switch. The locking mechanism in the Cisco NX-OS software restricts access to one user at a time per file.
This lock applies to newly created files and previously saved files. Before accessing any file, you must lock
the file and obtain the file key. A new file key is used by the locking mechanism for each lock request. The
key is discarded when the lock timeout of 15 seconds expires. The lock timeout value cannot be changed.
Procedure
The running configuration is not applied to the current configuration. The configuration is only applied when the ficon
vsannumberaply filefilename command is issued
Step 6 switch(config-ficon-file-portaddr)#name P3
Edits the content of the configuration file named IplFile1 by assigning the name P3 to port address 3. If the name did not
exist, it is created. If it existed, it is overwritten.
Use the show ficon vsan vsan-id file name command to display the contents of a specific FICON configuration
file.
switch# show ficon vsan 69 file name IPL3
FICON configuration file IPL3 in vsan 69
Description:
Port address 0(0)
Port name is
Port is not blocked
Prohibited port addresses are 255(0xff)
Use the show ficon vsan vsan-id filename filename portaddress command to display the FICON configuration
file information for a specific FICON port.
Description:
Port address 2(0x2)
Port name is
Port is not blocked
Prohibited port addresses are 255(0xff)
You can see the list of existing configuration files by issuing the show ficon vsan vsan-id command.
switch# show
ficon vsan 69
Ficon information for VSAN 69
Ficon is online
VSAN is active
Host port control is Enabled
Host offline control is Enabled
User alert mode is Disabled
SNMP port control is Enabled
Host set director timestamp is Enabled
Active=Saved is Enabled
Loadbalance is srcid-dstid
Number of implemented ports are 254
Key Counter is 11
FCID last byte is 0
Port Swapping
The FICON Port Swapping ability has been deprecated from NX-OS Release 9.4(1a). If there is a need to
move the FICON port address from one physical port to another, the ficon slot x assign port-numbers
command can be used. This will move both the port number and port address.
• The link between Z System and native tape drives (both IBM and Oracle)
• The link between Z System and Virtual Tape Systems (both IBM and Oracle)
• The back-end link between the VSM (Oracle VSM) and tape drive (Oracle)
Note FICON tape read acceleration over FCIP is supported from Cisco MDS NX-OS Release 5.0(1). For more
information refer to the Configuring FICON Tape Read Acceleration, on page 267.
Note For information about FCIP tape acceleration, refer to the Cisco MDS 9000 Series IP Services Configuration
Guide.
Procedure
This configuration change will disrupt all traffic on the FCIP interface in all
VSANs. Do you wish to continue? [no] y
This configuration change will disrupt all traffic on the FCIP interface in all
VSANs. Do you wish to continue? [no] y
What to do next
Use the show running-config command to verify the FICON tape acceleration over FCIP configuration.
Procedure
This configuration change will disrupt all traffic on the FCIP interface in all
VSANs. Do you wish to continue? [no]
This configuration change will disrupt all traffic on the FCIP interface in all
VSANs. Do you wish to continue? [no]
It is supported, however, to configure more traditional zoning for FICON VSANs. When this is done, it is
disruptive and should likely be done at initial setup. If this is done later, it needs to be carefully planned so
as not to create an outage of the environment.
First, the default behavior of zoning needs to be changed from permit. This is done by the following command.
switch# config terminal
switch(config)#no zonedefault-zone permit vsan 20
Next a Zoneset is defined within the FICON VSAN and then zones within this zoneset. The exact configuration
of these zones is discussed elsewhere but below are a few recommendations / guidelines for how to configure
zoning for FICON environments.
• Do not configure one large zone with all of the FICON ports in it. This is NOT the same as running with
default zone permit.
• The most recommended zoning configuration for FICON is one that closely mirrors the IOCDS and that
can be maintained in-sync with IOCDS changes as they occur. Creating zones for each CHPID or even
small group of CHPIDs and then adding to this all of the Control Units that are mapped to these CHPIDs
in the IOCDS. Once this is in place, any change that is made to the IOCDS can be mirrored to the zoning
database in the associated FICON VSAN and everything then stays working and in-sync.
• Remember to configure the FICON VSAN CUP device in the VSAN with the CHPIDs that access it per
the IOCDS. The WWN and FCID for the CUP(s) in the FICON VSAN by using the show fcns database
vsan xxcommand.
..
Zoning can be done by WWN or by FCID (or any of the other supported methods) but usually WWN will be
the best so that if CHPIDs need to move around, a change to the zoning database is not needed.
No zoning for the CUP device in the switch is needed for FICON VSANs that use default permit for zoning.
For more detailed information on the process of creating and maintaining zonesets and zones, refer to seethe
Cisco MDS 9000 Series Fabric Configuration Guide.
Note This command can be issued by the host if the host is allowed to do so (see the Allowing the Host to Move
the Switch Offline, on page 250).
CUP is supported by switches and directors in the Cisco MDS 9000 Family. The CUP function allows the
mainframe to manage the Cisco MDS switches as well as send in asysnchronous information to the switch
for things like port performance and device topology discovery.
In Displays Port Address Information in a Brief Format, on page 271, the interface column is populated
with the corresponding interface if the port number is installed. If the port number is uninstalled, this
space remains blank and indicates an unbound port number. For example, 56 is an unbound port
number in Displays Port Address Information in a Brief Format, on page 271.
Displays Port Address Counter Information, on page 272 displays the counters in FICON version
format 1 (32-bit format)
Displays the Startup Configuration Status, on page 275 displays the switch response to an
implicitly-issued copy running start command. In this case, only a binary configuration is saved until
you explicitly issue the copy running start command again (seeTable 23: Saving the Active FICON
and Switch Configuration , on page 254 )
Default Settings
Table 24: Default FICON Settings , on page 275 lists the default settings for FICON features.
Parameters Default
Parameters Default
Switch offline state Hosts are allowed to move the switch to an offline state.
Host clock control Allows host to set the clock on this switch.
Note The CIM Functionality and SMI-S is now supported with Cisco Prime Data Center Network Manager (DCNM).
Please refer to “Cisco Prime DCNM Installation Guide” and “SMI-S and Web Services Programming Guide,
Cisco DCNM for SAN.
• Distributed services TOV (D_S_TOV)—The valid range is from 5,000 to 10,000 milliseconds. The
default is 5,000 milliseconds.
• Error detect TOV (E_D_TOV)—The valid range is from 1,000 to 4,000 milliseconds. The default is
2,000 milliseconds. This value is matched with the other end during port initialization.
• Resource allocation TOV (R_A_TOV)—The valid range is from 5,000 to 10,000 milliseconds. The
default is 10,000 milliseconds. This value is matched with the other end during port initialization.
Caution The D_S_TOV, E_D_TOV, and R_A_ TOV values cannot be globally changed unless all VSANs in the
switch are suspended.
Note If a VSAN is not specified when you change the timer value, the changed value is applied to all VSANs in
the switch.
To configure Fibre Channel timers across all VSANs, follow these steps:
Procedure
Caution You cannot perform a nondisruptive downgrade to any earlier version that does not support per-VSAN FC
timers.
Note This configuration must be propagated to all switches in the fabric—be sure to configure the same value in
all switches in the fabric.
If a switch is downgraded to Cisco MDS SAN-OS Release 1.2 or 1.1 after the timer is configured for a VSAN,
an error message is issued to warn against strict incompatibilities. Refer to the Cisco MDS 9000 Family
Troubleshooting Guide.
To configure per-VSAN Fiber Channel timers, follow these steps:
Procedure
Warning: The vsan will be temporarily suspended when updating the timer value This configuration
would impact whole fabric. Do you want to continue? (y/n) y
Since this configuration is not propagated to other switches, please configure the same value in all
the switches
Configures the D_S_TOV value to be 6000 msec for VSAN 2. Suspends the VSAN temporarily. You have the option to
end this command, if required.
Procedure
Procedure
Procedure
Tip The changes are only available in the volatile directory and are subject to being discarded if the switch is
restarted.
To use administrative privileges and release a locked fctimer session, use the clear fctimer session command.
Note The number of pending fctimer configuration operations cannot be more than 15. At that point, you must
commit or terminate the pending configurations before performing any more operations.
Note The F_S_TOV constant, though not configured, is displayed in the output of the show fctimer
command.
• ISSD—Delete all the configured or static OUIs before performing a downgrade to a release that does
not support the wwn oui oui-id command.
For more information on deleting OUIs, see the Adding and Deleting OUIs, on page 283 section.
IEEE 48-bit address Type 1 = 0001b 000 0000 0000b 48-bit MAC address
IEEE registered Type 5 = 0101b IEEE company ID: 24 bits VSID: 36 bits
Caution Changes to the world-wide names should be made by an administrator or individual who is completely familiar
with switch operations.
Note As of Cisco SAN-OS Release 2.0(2b), the ELP is enhanced to be compliant with FC-SW-3.
Procedure
To allow further scalability for switches with numerous ports, the Cisco NX-OS software maintains a list of
HBAs exhibiting this behavior. Each HBA is identified by its company ID (also known known as Organizational
Unique Identifier, or OUI) used in the pWWN during a fabric login. A full area is allocated to the N ports
with company IDs that are listed, and for the others a single FC ID is allocated. Regardless of the kind (whole
area or single) of FC ID allocated, the FC ID entries remain persistent.
This section includes the following topics:
Caution Persistent entries take precedence over company ID configuration. If the HBA fails to discover a target, verify
that the HBA and the target are connected to the same switch and have the same area in their FC IDs, then
perform the following procedure:1. Shut down the port connected to the HBA.2. Clear the persistent FC ID
entry.3. Get the company ID from the Port WWN.4. Add the company ID to the list that requires area
allocation.5. Bring up the port.
Tip We recommend that you set the fcinterop FC ID allocation scheme to auto and use the company ID list and
persistent FC ID configuration to manipulate the FC ID device allocation.
Use the fcinterop FCID allocation auto command to change the FC ID allocation and the show
running-config command to view the currently allocated mode.
• When you issue a write erase, the list inherits the default list of company IDs shipped with a relevant
release.
To allocate company IDs, follow these steps:
Procedure
You can implicitly derive the default entries shipped with a specific release by combining the list of
Company IDs displayed without any identification with the list of deleted entries.
You can also view or obtain the company IDs in a specific WWN by issuing the show fcid-allocation
company-id-from-wwn command (see Displays the Company ID for the Specified WWN, on page
287). Some WWN formats do not support company IDs. In these cases, you many need to configure
the FC ID persistent entry.
Switch Interoperability
Interoperability enables the products of multiple vendors to interact with each other. Fibre Channel standards
guide vendors towards common external Fibre Channel interfaces.
If all vendors followed the standards in the same manner, then interconnecting different products would
become a trivial exercise. However, not all vendors follow the standards in the same way, thus resulting in
interoperability modes. This section briefly explains the basic concepts of these modes.
Each vendor has a regular mode and an equivalent interoperability mode, which specifically turns off advanced
or proprietary features and provides the product with a more amiable standards-compliant implementation.
Note For more information on configuring interoperability for the Cisco MDS 9000 Family switches, refer to the
Cisco MDS 9000 Family Switch-to-Switch Interoperability Configuration Guide .
Domain IDs Some vendors cannot use the full range of 239 domains within a fabric.
Domain IDs are restricted to the range 97-127. This is to accommodate McData’s
nominal restriction to this same range. They can either be set up statically (the
Cisco MDS switch accept only one domain ID, if it does not get that domain ID
it isolates itself from the fabric) or preferred. (If it does not get its requested domain
ID, it accepts any assigned domain ID.)
Timers All Fibre Channel timers must be the same on all switches as these values are
exchanged by E ports when establishing an ISL. The timers are F_S_TOV,
D_S_TOV, E_D_TOV, and R_A_TOV.
F_S_TOV Verify that the Fabric Stability Time Out Value timers match exactly.
D_S_TOV Verify that the Distributed Services Time Out Value timers match exactly.
E_D_TOV Verify that the Error Detect Time Out Value timers match exactly.
R_A_TOV Verify that the Resource Allocation Time Out Value timers match exactly.
Trunking Trunking is not supported between two different vendor’s switches. This feature
may be disabled on a per port or per switch basis.
Default zone The default zone behavior of permit (all nodes can see all other nodes) or deny
(all nodes are isolated when not explicitly placed in a zone) may change.
Zoning attributes Zones may be limited to the pWWN and other proprietary zoning methods (physical
port number) may be eliminated.
Note
Brocade uses the cfgsave command to save fabric-wide zoning configuration.
This command does not have any effect on Cisco MDS 9000 Family switches if
they are part of the same fabric. You must explicitly save the configuration on
each switch in the Cisco MDS 9000 Family.
Zone propagation Some vendors do not pass the full zone configuration to other switches, only the
active zone set gets passed.
Verify that the active zone set or zone configuration has correctly propagated to
the other switches in the fabric.
TE ports and TE ports and PortChannels cannot be used to connect Cisco MDS to non-Cisco
PortChannels MDS switches. Only E ports can be used to connect to non-Cisco MDS switches.
TE ports and PortChannels can still be used to connect an Cisco MDS to other
Cisco MDS switches even when in interop mode.
FSPF The routing of frames within the fabric is not changed by the introduction of
interop mode. The switch continues to use src-id, dst-id, and ox-id to load balance
across multiple ISL links.
Domain reconfiguration This is a switch-wide impacting event. Brocade and McData require the entire
disruptive switch to be placed in offline mode and/or rebooted when changing domain IDs.
Domain reconfiguration This event is limited to the affected VSAN. Only Cisco MDS 9000 Family switches
nondisruptive have this capability—only the domain manager process for the affected VSAN is
restarted and not the entire switch.
Name server Verify that all vendors have the correct values in their respective name server
database.
Note Brocade’s msplmgmtdeactivate command must explicitly be run prior to connecting from a Brocade switch
to either Cisco MDS 9000 Family switches or to McData switches. This command uses Brocade proprietary
frames to exchange platform information, which Cisco MDS 9000 Family switches or McData switches do
not understand. Rejecting these frames causes the common E ports to become isolated.
To configure interop mode 1 in any switch in the Cisco MDS 9000 Family, follow these steps:
Procedure
Step 1 Place the VSAN of the E ports that connect to the OEM switch in interoperability mode.
Note
You cannot enable interop modes on FICON-enabled VSANs.
In Cisco MDS 9000 switches, the default is to request an ID from the principal switch. If the preferred option is used,
Cisco MDS 9000 switches request a specific ID, but still join the fabric if the principal switch assigns a different ID. If
the static option is used, the Cisco MDS 9000 switches do not join the fabric unless the principal switch agrees and assigns
the requested ID.
Note
When changing the domain ID, the FC IDs assigned to N ports also change.
Step 3 Change the Fibre Channel timers (if they have been changed from the system defaults).
Note
The Cisco MDS 9000, Brocade, and McData FC Error Detect (ED_TOV) and Resource Allocation (RA_TOV) timers
default to the same values. They can be changed if needed. The RA_TOV default is 10 seconds, and the ED_TOV default
is 2 seconds. Per the FC-SW2 standard, these values must be the same on each switch within the fabric.
Step 4 When making changes to the domain, you may or may not need to restart the Cisco MDS domain manager function for
the altered VSAN.
• Force a fabric reconfiguration with the disruptive option.
or
• Do not force a fabric reconfiguration.
SUMMARY STEPS
1. Use the show version command to verify the version.
2. Use the show interface brief command to verify if the interface states are as required by your configuration.
3. Use the show run command to verify if you are running the desired configuration.
4. Use the show vsan command to verify if the interoperability mode is active.
5. Use the show fcdomain vsan command to verify the domain ID.
6. Use the show fcdomain domain-list vsan command to verify the local principal switch status.
7. Use the show fspf internal route vsan command to verify the next hop and destination for the switch.
8. Use the show fcns data vsan command to verify the name server information.
DETAILED STEPS
Procedure
Step 2 Use the show interface brief command to verify if the interface states are as required by your configuration.
Step 3 Use the show run command to verify if you are running the desired configuration.
<snip>
interface fc2/32
interface mgmt0
ip address 6.1.1.96 255.255.255.0
switchport encap default
no shutdown
vsan database
vsan 1 interop
boot system bootflash:/m9500-system-253e.bin sup-1
boot kickstart bootflash:/m9500-kickstart-253e.bin sup-1
boot system bootflash:/m9500-system-253e.bin sup-2
Step 4 Use the show vsan command to verify if the interoperability mode is active.
Step 5 Use the show fcdomain vsan command to verify the domain ID.
Step 6 Use the show fcdomain domain-list vsan command to verify the local principal switch status.
0x63(99) 10:00:00:60:69:c0:0c:1d
0x64(100) 20:01:00:05:30:00:51:1f [Local]
0x65(101) 10:00:00:60:69:22:32:91 [Principal]
--------- -----------------------
Step 7 Use the show fspf internal route vsan command to verify the next hop and destination for the switch.
Step 8 Use the show fcns data vsan command to verify the name server information.
Default Settings
Table 27: Default Settings for Advanced Features , on page 294 lists the default settings for the features included
in this chapter.
Parameters Default
Parameters Default
Note In Cisco MDS NX-OS Release 6.2(9), the FC management feature is disabled by default. To enable FC
management feature, use the fc-management enable command.
You can configure which pWWNs can send FC-CT management query and modify request to the management
server. When any of the modules, such as a zone server, unzoned Fibre Channel name server (FCNS), or
Fabric Configuration Server (FCS) receives an FC-CT management query, they perform a read operation on
the FC-management database. If device is found in FC-management database, a reply is sent according to the
permissions granted. If the device is not found in the FC-management database, each module sends a reject.
If FC-management is disabled, each module processes each management query.
Configuration Guidelines
The FC-management security feature has the following configuration guidelines:
• When the FC-management security feature is enabled on a Cisco MDS switch, all management queries
to the server are rejected unless the port world-wide name (pWWN) of the device that is sending
management queries is added to FC-management database.
• When you enable FC Management, FC-CT management server queries from N_Port Virtualization (NPV)
switches to N_Port Identifier Virtualization (NPIV) switches are rejected. We recommend that you add
the switch world-wide name (sWWN) of the NPV switch to the FC management database of the NPIV
switch after enabling the FC-management security feature.
Procedure
To verify the if the FC-management security feature is enabled or not, use the show fc-management
status command:
Default Settings
Table 28: Default FC Management Settings , on page 299 lists the default settings for the FC management
security feature in a Cisco MDS 9000 Family switch.
Parameters Default
FC-management Disabled
To ensure successful backup and restoration of zoning configurations in a Cisco MDS network, first, access the zone configuration via DCNM SAN Client to edit the local full zone database. Backup the configuration using TFTP, SCP, SFTP, or FTP by selecting the appropriate protocol and entering the server's IP, username, and password, followed by specifying the file path . It's crucial to store backups securely and verify their completeness. To restore, you overwrite the existing configuration on a switch with the backup, ensuring the alignment of configurations across reboots or power failures. Consistently following this process guards against data loss and maintains configuration integrity .
Device alias configuration changes in a Cisco MDS 9000 fabric can be distributed using Cisco Fabric Services (CFS) and Device Alias Diffs-Only Distribution. CFS allows coordinated distribution of device alias modifications to all switches in the fabric . Device Alias Diffs-Only Distribution, available from NX-OS Release 7.3(0)D1(1), optimizes scalability by distributing only differences (diffs) rather than the entire database . Prerequisites for using Device Alias Diffs-Only Distribution include ensuring that all switches in the fabric run at least Cisco MDS NX-OS Release 7.3(0)D1(1) with this feature enabled . Enhanced mode is also recommended for device aliases, as it allows native handling and automatic tracking of changes by applications . Furthermore, maintaining consistent naming conventions and backups is crucial for preventing conflicts and merge failures during distribution .
Redundant link configurations using PortChanneling enhance network efficiency and resiliency in a Fibre Channel network by aggregating multiple physical links into a single logical channel. This reduces the complexity seen by the FSPF protocol, leading to a smaller topology database and less frequent updates. PortChanneling minimizes the impact of individual link failures, as the logical link remains operational if some physical links are still active, thus preventing route changes and associated delays . This configuration not only improves data throughput by combining the bandwidth of all physical links but also enhances fault tolerance, ensuring that traffic continues to flow without interruption across the network despite link failures .
When configuring multiple paths for traffic in a Fibre Channel network using FSPF, it is essential to consider the link costs and utilize the FSPF cost multiplier feature. FSPF bases path status on link states and chooses paths based on the minimal cost, which can lead to inefficiencies when parallel paths exceed 128 Gbps. To mitigate this, handlers should configure the FSPF cost multiplier, ensuring all switches in the fabric use the same multiplier for consistent path cost calculations . Furthermore, redundancy and utilizing PortChanneling can improve network resilience and efficiency by treating multiple physical connections as a single logical link, which reduces database size and frequency of link updates .
Backing up device alias configurations before performing Cisco Fabric Services (CFS) merges is critical to prevent merge failures and traffic disruptions. Conflicts such as duplicate device-alias names or duplicate pWWNs may cause merge failures, and having a backup allows for restoration of the correct database without data loss. A blank commit could inadvertently overwrite the device aliases across all switches with those from the local switch. Maintaining backups ensures that changes can be reverted, and the network remains consistent with planned configurations . Furthermore, such backups are crucial if a switch reloads or loses power, as the startup configuration must align with the desired running configuration after device-alias changes are committed .
The use of dynamic FC ID allocations in FICON-enabled VSANs on Cisco MDS 9000 switches has several implications. First, when FICON is enabled or disabled on a VSAN, all ports are shut down and restarted to switch from a dynamic to a static FC ID allocation, reflecting the requirement for static domain IDs in FICON configurations . This process is crucial because FICON environments mandate in-order delivery and fabric binding, which necessitate the consistent use of static IDs to maintain fabric stability and avoid disruptions . Additionally, the dynamic FC ID allocation scheme is inherently changed to a static scheme to align with FICON's operational requirements, affecting load balancing schemes and operational settings within the VSAN .
FICON ports in a Cisco MDS 9000 Series switch require specific configurations that differ from standard FC ports by using static FC IDs instead of dynamic FC ID allocation . Enabling FICON necessitates adjustments to ensure in-order delivery, fabric binding, and a static domain ID configuration . These settings ensure compatibility with FICON's unique requirements, unlike standard Fiber Channel (FC) configurations that use dynamic allocation and do not enforce such stringent constraints . Additionally, when FICON is enabled, all ports are shut down and restarted to switch between allocation schemes, highlighting the distinct handling needed for FICON environments .
In-Order Delivery is crucial for FICON configurations because it ensures that frames are delivered in the exact order they were sent, which is a fundamental requirement for compatibility with FICON protocol operations. In FICON-enabled VSANs, disabling in-order delivery is prohibited, as FICON relies on the deterministic arrival of data, preventing out-of-order frame handling or data corruption. This is particularly important for mainframe environments where consistency and reliability are prioritized. The adherence to in-order delivery maintains data integrity and protocol compliance, which is critical for operations in environments using FICON .
The FSPF protocol ensures fault tolerance in a fabric by utilizing a link state protocol that maintains a topology database, tracking the state of links and associating costs with them. When a topology change occurs, FSPF rapidly recalculates paths using the Dijkstra algorithm, ensuring minimal disruption. Redundant links augment this fault tolerance by providing alternative paths and using PortChanneling to bundle multiple links into a single logical one. This reduces the strain on the link state database and minimizes disruptions from individual link failures since the aggregation keeps the logical link intact despite physical link issues . In a fault-tolerant topology, such as a partial mesh, redundant links allow any switch to maintain communication with others even if a link fails, thereby ensuring continuous network operation .
Dead time interval settings in FSPF are critical for determining how quickly the network can recognize a down link or unreachable switch, which directly affects the network's stability and ability to quickly regain equilibrium after a topology change. A shorter dead time interval facilitates faster detection and response to topology changes, leading to quicker re-convergence times and minimization of data loss. Conversely, overly short intervals might result in false positives, increasing load due to unnecessary recalculations. Balancing this setting is crucial as it affects both the responsiveness and stability of the network, ensuring that changes are accurately detected while avoiding undue overhead .