Escolar Documentos
Profissional Documentos
Cultura Documentos
1. Create the VSAN number you wish to use (1 is the default, not
recommended to use the default for production SAN traffic)
2. Add interfaces to your VSAN (just like you do with a VLAN)
3. Do any interface configuration needed on the FC interfaces (Just turn them
on in most cases)
4. Verify the cabling and ensure that you have SAN connectivity
5. Create Aliases for WWNs (makes life easier)
6. Create required zones
7. Add members to your zones (I recommend using PWWNs)
8. Create a zoneset (I think Brocade calls this a config)
9. Add your zones to your zoneset
10. Activate the zoneset on the fabric
So lets walk through them one at a time and show the associated
1.Create the VSAN number you wish to use (1 is the default, not
recommended to use the default for production SAN traffic)
MDS(config)# vsan database
MDS(config-vsan-db)# vsan <new VSAN number>
MDS(config-vsan-db)# vsan <new VSAN number> name <VSAN name>
MDS(config-vsan-db)# exit
-Verify the cabling and ensure that you have SAN connectivity
Your on your own here. As with anything fiber, if you dont have link, make
sure you have the pair flipped correctly from SFP to SFP.
-Create a zoneset (I think Brocade calls this a config) and add the zones to
the zoneset.
MDS(config)# zoneset name <name of zoneset> vsan <VSAN number>
MDS(config-zoneset)# member <zone 1>
MDS(config-zoneset)# member <zone 2>
MDS(config-zoneset)# member <zone 3>
MDS(config-zoneset)# exit
Conclusion
And thats it. It goes without saying, but save your config when you are
done.
SHARE THIS:
TwitterEmailPrintLinkedIn
Tags: MDS, SAN
So if you look at the terms we listed in the last post. You might be scratching
your head and wondering what the difference is between WWNs and
FCID/NPIDs. This was something I had trouble understanding initially as well.
For starters, lets agree that well simplify and call NPIDS/FCIDS just FCIDs
going forward. The terms are used interchangeably, but for the sake of
clarity, Ill just call them FCIDs going forward.
That being said, lets talk about about the FCID. The FCID is a 24 bit (3 byte)
field used to route frames through a FC network. Lets walk through each
byte of the FCID.
1st byte Domain ID. The Domain ID is given to each FC switch in a fabric
and must be unique for each switch.
2nd byte Area ID. The Area ID is very similar to the 3rd byte. In fact, in
Cisco documentation, youll find it called the exact same thing as the 3rd
byte. The Area ID is used to identify an N type port that is connected to a
switch.
3rd byte Port ID. The Port ID is used to identify a single FC object on the FC
fabric.
In a SAN each device that is going to talk on the fabric has a WWN and a
FCID. The WWN is very much like a MAC address in Ethernet speak. Each
WWN is globally unique with some exceptions. There are instances where
devices allow an administrator to manually configure a WWN but we wont be
discussing those instances. For basic understanding, lets say that each
WWN is globally unique. So an HBA that had multiple ports would have a
WWN for itself, and then PWWN (port WWNs) for each one of its ports.
Additionally, each port on a fabric switch has a FWWN (fabric WWNs) which
are sometimes also called FPWNNs (fabric port WWNs).
So, a device talking on the fabric has multiple identifiers. Still with me?
The FCID is used in routing through the fabric. So in a FC frame there is S_ID
(Source ID) and a D_ID (Destination ID) field. These are populated with the
appropriate FCID to facilitate traffic through the fabric and to the correct
node.
So what is the WWN used for? Enter zones Put basically, for two devices to
communicate, they MUST be in the same FC zone. Zones are primarily a
security practice. In reality, if everything was in the same zone, and in the
same fabric, everything could talk to everything. That isnt to say that all the
LUNs would show up on all the servers, its just implying that it would be
possible. Zoning is a fabric configuration, not a disk array to host mapping
configuration. So lets go over a quick example so that we are all on the
same page. Take the diagram below as an example. (Side note: Ive had this
wonderfully large whiteboard in my home office for almost a year and have
hardly ever used it. I will waste resources no longer, look forward to more
whiteboard pictures with my hard to read hand writing.)
photo
So as we can see here (in my glorious white board depiction) we have two
servers. A backup server that needs access to the disk array for its local disk,
and access to the tape library to run backups. We also have a file server that
just has access to the disk array. It doesnt need access to the tape library
since the backup server is accessing the file servers files over the network,
and then putting them to tape itself. Thats a pretty simple example of
zoning.
To be clear, you dont always have to use WWNs to create zones. You can
also create zones based on
-PWWN or FWWN
-FC Alias (Basically, a name associated with a WWN)
-FCID
-Physical interface
Another concept of logical SAN separation is VSANs. While its usually viewed
as a Cisco fabric feature I believe its recently been approved as a global
standard. VSANs are much like, you guessed it, VLANs. A VSAN allows you to
have logically separate fabrics without actually having to have different
physical fabrics.
photo5
(Additional side note: Im going to get colored markers to make this more
straight forward)
As you can see in the drawing above, all four devices hang off of the same
physical fabric, but since they are in separate VSANs, they are unable to
communicate.
So lets take a step back and talk about the entire Cisco SAN configuration.
We spoke about zones and VSANs, now lets talk about how to configure
them. This is the basic list I use when talking about SAN config on an MDS.
1. Create the VSAN number you wish to use (1 is the default, not
recommended to use the default for production SAN traffic)
2. Add interfaces to your VSAN (just like you do with a VLAN)
3. Do any interface configuration needed on the FC interfaces (Just turn them
on in most cases)
4. Verify the cabling and ensure that you have SAN connectivity
5. Create Aliases for WWNs (makes life easier)
6. Create required zones
7. Add members to your zones (I recommend using PWWNs)
8. Create a zoneset (I think Brocade calls this a config)
9. Add your zones to your zoneset
10. Activate the zoneset on the fabric
(Dont worry Ill show you how to do each one of these steps in the next
article)
Youll notice that we introduced the term zoneset in the steps. We havent
talked about them yet, so lets take a brief moment to discuss them. There
are some basic rules I like to think of when talking about zones/zonesets that
do a pretty decent job defining the term. They are..
-If zoning isnt active at all, then all devices are default to being a member of
the default VSAN.
So if we looked at the big picture, the layout would look like this.
photo7
I probably shouldnt have used VSAN 1 in the diagram since thats the default,
but you get the idea.
Please keep in mind that we are talking about a very basic configuration here.
There are far more advanced topics/concepts in regards to all of these
functional items. As you get more comfortable with the configuration, you
can start playing with the additional functionality.
SHARE THIS:
TwitterEmailPrintLinkedIn1
Tags: MDS, SAN
The other benefit of the 5k/2k solution is that they support 10 gig FCOE. That
is, with a fiber module in the 5k, I can connect the 5k to a SAN switch (MDS in
most cases) and then extend a VSAN to the 5k. The 5k can then associate
the VSAN to a VLAN. The access ports on the 2k are then configured as
trunks, and allow traffic from both the SAN VLAN and the data VLAN (which is
also connected to the 5k) to traverse a single link to the server. The server
then uses what are called CNAs (Converged Network Adapter) to split the FC
and IP traffic out and deliver it to the host. So rather than having dual NICs
(or more), and dual HBAs, we now have dual CNAs that deliver redundant
paths to both the IP network as well as the SAN fabric.
It had been awhile since I worked with fiber channel, so to wrap up this post
Im going to define some of the basic terms/acronyms you should know about
when working with this sort of technology. Some will be obvious to many of
you, but Im going to cover all of the basics. In following posts I plan on
discussing NPV and NPIV, 5k/2k configuration, and troubleshooting steps for
FCOE pertaining to the Nexus platform.
SHARE THIS:
TwitterEmailPrintLinkedIn
Tags: FCOE, Nexus, SAN
LinkedInTwitterEmailRSS
cisco mds
Search
FOLLOW ME ON TWITTER
My Tweets
CATEGORIES
Automation (2)
Cisco (Networking) (171)
Compute (1)
DevOps (29)
DNS (1)
docker (4)
F5 (16)
golang (1)
Google (4)
Kubernetes (2)
Links (1)
Linux (15)
Microsoft (5)
OpenStack (3)
Opinion (1)
Python (3)
Rants (1)
SDN (9)
Storage (8)
Tech field day (3)
Uncategorized (38)
Virtualization (6)
VMWare (23)
VOIP (6)
TAGS
AnyConnect ASA BGP CCIE CentOS CME CoreOS CSD docker Easy VPN EIGRP
FCOE FHRP IAS IGP ISCSI kubernetes LeftHand LISP LTM MDS MPLS Multicast
NAT Nexus NFD10 NSX OpenFlow OpenStack OSPF QOS RADIUS RedHat
Routing saltstack SAN Spanning-tree Storage Subnetting Switching TISHK VCP
VMWare WAAS WebVPN
Subscribe to feed
:)