Escolar Documentos
Profissional Documentos
Cultura Documentos
Access Gateway
Administrators Guide
Copyright 2007-2008 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, Fabric OS, File Lifecycle Manager, MyView, and StorageX are registered trademarks and the Brocade B-wing symbol, DCX, and SAN Health are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands, products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of their respective owners. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that accompany it. The product described by this document may contain open source software covered by the GNU General Public License or other open source license agreements. To find-out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
Document History
The following table lists all versions of the Access Gateway Administrators Guide.
Document Title
Access Gateway Administrators Guide Access Gateway Administrators Guide Access Gateway Administrators Guide
Publication Number
53-1000430-01 53-1000633-01 53-1000605-01
Summary of Changes
First version Added support for the 200E Added support for new policies and changes to N_Port mappings.
Publication Date
January 2007 June 2007 October 2007
53-1000605-02
March 2008 Added support for new platforms: 300 and the 4424. Added support for new features: - Masterless Trunking - Direct Target Connectivity - Advance Device Security policy - 16- bit routing Added support for: - Cascading Access Gateway. Updated to fix the table of contents Updated for FOS 6.2 July 2008 July 2008 November 2008
Access Gateway Administrators Guide Access Gateway Administrators Guide Access Gateway Administrators Guide
iii
iv
Contents
Chapter 1
Getting Started
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Brocade Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Fabric OS features in Access Gateway mode . . . . . . . . . . . . . . . . . . . 2 Access Gateway port types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Comparison of Access Gateway ports to standard switch ports. 4 How Access Gateway maps ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Access Gateway limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Upgrade and downgrade considerations for switches in AG mode . . 6 Advance Device Security policy. . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Automatic Port Configuration policy . . . . . . . . . . . . . . . . . . . . . . . 7 Port Grouping policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Chapter 2
Advanced Device Security policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Enabling the Advanced Device Security policy. . . . . . . . . . . . . . 10 Disabling the Advanced Device Security policy . . . . . . . . . . . . . 10 Setting which devices can log in if ADS policy is enabled. . . . . 10 Setting which devices cannot log in if ADS policy is enabled . . 11 Removing devices from the list of devices allowed at login . . . 11 Adding new devices to the list of devices allowed at login . . . . 11 Displaying the list of devices on the switch . . . . . . . . . . . . . . . . 12 Automatic Port Configuration policy. . . . . . . . . . . . . . . . . . . . . . . . . . 12 Enabling the Automatic Port Configuration policy . . . . . . . . . . . 13 Disabling the Automatic Port Configuration policy . . . . . . . . . . 13 Rebalancing F_Ports with APC policy enabled. . . . . . . . . . . . . . 13 Failover policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Enabling the Failover policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Disabling the Failover policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Failback policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Enabling the Failback policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Cold Failover policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Port Grouping policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Creating a port group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Adding an N_Port to a port group . . . . . . . . . . . . . . . . . . . . . . . . 20 Deleting an N_Port from a port group . . . . . . . . . . . . . . . . . . . . 20 Removing a port group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Renaming a port group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Disabling the Port Group policy. . . . . . . . . . . . . . . . . . . . . . . . . . 21 Access Gateway policy enforcement matrix . . . . . . . . . . . . . . . . . . . 22 Access Gateway trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Access Gateway trunking considerations for the Edge switch . 23 Trunk group creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Setting up F_Port trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Assigning a Trunk Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Enabling the DCC policy on trunk . . . . . . . . . . . . . . . . . . . . . . . . 28 Configuration management for trunk areas . . . . . . . . . . . . . . . . . . . 28 Enabling Access Gateway trunking . . . . . . . . . . . . . . . . . . . . . . . 28 Disabling F_Port trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 F_Port Trunking monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Access Gateway Cascading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Chapter 3
vi
Connectivity to Cisco Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Access Gateway routing requirements with Cisco fabrics. . . . . 36 Enabling NPIV on a Cisco switch. . . . . . . . . . . . . . . . . . . . . . . . . 36 Workaround for QLogic-based devices . . . . . . . . . . . . . . . . . . . . 37 Editing Company ID List if no FC target devices on switch . . . . 37 Adding or deleting an OUI from the Company ID List . . . . . . . . 38 Enabling Flat FCID mode if no FC target devices on switch . . . 39 Editing Company ID list if target devices on switch . . . . . . . . . . 39 Access Gateway mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Enabling Access Gateway mode . . . . . . . . . . . . . . . . . . . . . . . . . 40 Port States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Disabling Access Gateway mode . . . . . . . . . . . . . . . . . . . . . . . . 42 Saving the Access Gateway configuration . . . . . . . . . . . . . . . . . 42 Rejoining switches to a fabric. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Reverting to a previous configuration. . . . . . . . . . . . . . . . . . . . . 43
Chapter 4
Appendix A Index
Troubleshooting
vii
viii
Figures
Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figure 8 Figure 9 Figure 10 Figure 11
Access Gateway and fabric switch comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Port usage comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Example F_Port-to-N_Port mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Example 1 and 2 Failover policy behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Failback policy behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Port Group Zero (pg0) setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Port grouping behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Port Group 1 (pg1) setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Access Gateway cascading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Initialized ports in Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Example of adding an external F_Port (F9) on an embedded switch . . . . . . . . . 47
ix
Tables
Table 1 Table 2 Table 3 Table 4 Table 5 Table 6 Table 7 Table 8 Table 9 Table 10 Table 11 Table 12
Fabric OS components supported on Access Gateway . . . . . . . . . . . . . . . . . . . . . 3 Port configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Description of F_Port-to-N_Port mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Firmware upgrade and downgrade scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Policy enforcement matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Access Gateway trunking considerations for the Edge switch . . . . . . . . . . . . . . 23 PWWN format for F_Port and N_Port trunk ports. . . . . . . . . . . . . . . . . . . . . . . . . 26 Address identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 OUI IDs that require special treatment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Port state description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Access Gateway default F_Port-to-N_Port mapping. . . . . . . . . . . . . . . . . . . . . . . 53 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
xi
xii
How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Whats new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv Key terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Additional information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi Getting technical help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Chapter 1, Getting Started describes how to use Access Gateway to create seamless
connectivity to any Storage Area Network (SAN) fabric.
Chapter 2, Enabling Policies on Switches in Access Gateway Mode describes how to enable
policies on a switch in Access Gateway mode.
Chapter 3, Connecting Devices Using Access Gateway describes how to connect multiple
devices using Access Gateway.
Chapter 4, Configuring Ports in Access Gateway mode describes how to configure ports in
Access Gateway mode.
xiii
Supported software M-EOSc products: Release 9.1 or later and 9.6 or later Cisco Products: SAN-OS 3.0(1) or later and 3.1(1) or later Supported platforms Brocade 300 (24-port version only), 5100 Embedded switches: 5410, 5424, 5480 Supported configurations in cascaded AG
For further information, refer to the release notes.
Document conventions
This section describes text formatting conventions and important notices formats.
Text formatting
The narrative-text formatting conventions that are used in this document are as follows: bold text Identifies command names Identifies the names of user-manipulated GUI elements Identifies keywords and operands Identifies text to enter at the GUI or CLI Provides emphasis Identifies variables Identifies paths and Internet addresses Identifies document titles Identifies CLI output Identifies syntax examples
italic text
code text
For readability, command names in the narrative portions of this guide are presented in mixed lettercase: for example, switchShow. In actual examples, command lettercase is often all lowercase. Otherwise, this manual specifically notes those cases in which a command is case sensitive. The ficonCupSet and ficonCupShow commands are an exception to this convention.
xiv
command
--option, option -argument, arg
Commands are printed in bold. Command options are printed in bold. Arguments. Optional element. Variables are printed in italics. In the help pages, values are underlined or enclosed in angled brackets < >. Repeat the previous element, for example member[;member...] Fixed values following arguments are printed in plain font. For example, --show WWN Boolean. Elements are exclusive. Example: --show -mode egress | ingress
NOTE
A note provides a tip, emphasizes important information, or provides a reference to related information.
ATTENTION
An Attention statement indicates potential damage to hardware or data.
CAUTION A Caution statement alerts you to situations that can be potentially hazardous to you.
DANGER A Danger statement indicates conditions or situations that can be potentially lethal or extremely hazardous to you. Safety labels are also attached directly to products to warn of these conditions or situations.
Key terms
For definitions of SAN-specific terms, visit the Storage Networking Industry Association online dictionary at: http://www.snia.org/education/dictionary. For definitions specific to Brocade and Fibre Channel, see the Brocade Glossary. The following terms are used in this manual to describe Access Gateway mode and its components.
xv
Access Gateway (AG) Fabric OS mode for switches that reduces SAN (storage area network) deployment complexity by leveraging NPIV (N_Port ID Virtualization). E_Port Edge switch F_Port An ISL (Interswitch link) port. A switch port that connects switches together to form a fabric. A fabric switch that connects host, storage, or other devices, such as Brocade Access Gateway, to the fabric. A fabric port. A switch port that connects a host, HBA (host bus adaptor), or storage device to the SAN. On Brocade Access Gateway, the F_Port connects to a host or a target. On Brocade Access Gateway, the configuration of F_Port to N_Port routes. A node port. A Fibre Channel host or storage port in a fabric or point-to-point connection. On Brocade Access Gateway, the N_Port connects to the Edge switch. N_Port ID Virtualization. Allows a single Fibre Channel port to appear as multiple, distinct ports providing separate port identification and security zoning within the fabric for each operating system image as if each operating system image had its own unique physical port.
Mapping N_Port
NPIV
Preferred Secondary N_Port On the Brocade Access Gateway, the preferred secondary N_Port refers to the secondary path to which an F_Port fails over if the primary N_Port goes offline.
Additional information
This section lists additional Brocade and industry-specific documentation that you might find helpful.
xvi
Brocade resources
To get up-to-the-minute information, join Brocade Connect. Its free! Go to http://www.brocade.com and click Brocade Connect to register at no cost for a user ID and password. For practical discussions about SAN design, implementation, and maintenance, you can obtain Building SANs with Brocade Fabric Switches through: http://www.amazon.com For additional Brocade documentation, visit the Brocade SAN Info Center and click the Resource Library location: http://www.brocade.com Release notes are available on the Brocade Connect Web site and are also bundled with the Fabric OS firmware.
Best practice guides, white papers, data sheets, and other documentation is available through
the Brocade Partner Web site. For additional resource information, visit the Technical Committee T11 Web site. This Web site provides interface standards for high-performance and mass storage applications for Fibre Channel, storage management, and other applications: http://www.t11.org For information about the Fibre Channel industry, visit the Fibre Channel Industry Association Web site: http://www.fibrechannel.org
Technical Support contract number, if applicable Switch model Switch operating system version Error numbers and messages received supportSave command output
xvii
Detailed description of the problem, including the switch or fabric behavior immediately
following the problem, and specific questions
Description of any troubleshooting steps already performed and the results Serial console and Telnet session logs Syslog message logs
2. Switch Serial Number The switch serial number and corresponding bar code are provided on the serial number label, as shown here.
:
Brocade 200EOn the nonport side of the chassis Brocade 300, 4100, 4900, 5100, 5300, 7500, and Brocade Encryption SwitchOn the
switch ID pull-out tab located inside the chassis on the port side on the left
Brocade 5000On the switch ID pull-out tab located on the bottom of the port side of the
switch
Brocade 7600On the bottom of the chassis Brocade 48000Inside the chassis next to the power supply bays Brocade DCXOn the bottom right on the port side of the chassis Brocade DCX-4SOn the bottom right on the port side of the chassis, directly above the cable management comb.
3. World Wide Name (WWN) Use the wwn command to display the switch WWN. If you cannot use the wwn command because the switch is inoperable, you can get the WWN from the same place as the serial number, except for the Brocade DCX. For the Brocade DCX, access the numbers on the WWN cards by removing the Brocade logo plate at the top of the nonport side of the chassis.
Document feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and completeness of this document. However, if you find an error or an omission, or you think that a topic needs further development, we want to hear from you. Forward your feedback to: documentation@brocade.com Provide the title and version number of the document and as much detail as possible about your comment, including the topic heading and page number and your suggestions for improvement.
xviii
Chapter
Getting Started
In this chapter
Brocade Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fabric OS features in Access Gateway mode. . . . . . . . . . . . . . . . . . . . . . . . . . Access Gateway port types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How Access Gateway maps ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Access Gateway limitations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1 2 4 5 6
FIGURE 1
The following points summarize the differences between a Fabric OS switch in Native mode and a Fabric OS switch in AG mode:
The Fabric OS switch in Native mode is a part of the fabric; it requires two to four times as
many physical ports, consumes fabric resources, and can connect to a Fabric OS fabric only.
A switch in AG mode is outside of the fabric; it reduces the number of switches in the fabric
and the number of required physical ports. You can connect an AG switch to either a Fabric OS, M-EOS, or Cisco-based fabric.
TABLE 1
Feature
Access Control Audit Beaconing Config Download/Upload DHCP Environmental Monitor Error Event Management Extended Fabrics
Fabric Device Management Interface (FDMI) Yes* Fabric Manager Fabric Watch FICON (includes CUP) High Availability IPoverFC Native Interoperability Mode License Log Tracking Management Server Manufacturing Diagnostics N_Port ID Virtualization Name Server Network Time Protocol (NTP) Yes** Yes (limited) No Hot Code Load Yes* NA Yes** Yes NA Yes Yes NA No (no relevance from fabric perspective. In embedded switch, time should be updated by server management utility. NA Yes (Basic PM only, no APM support) No No Partial (ADS and DCC policies) Yes Yes Yes** Yes Yes NA
Open E_Port Performance Monitor Port Mirroring QuickLoop, QuickLoop Fabric Assist Security SNMP Speed Negotiation Trunking ValueLineOptions (Static POD, DPOD) Web Tools Zoning, Admin Domains
F_Port - fabric port that connects a host, HBA, or storage device to a switch in AG mode. N_Port - node port that connects a switch in AG mode to the F_Port of the fabric switch.
Fabric
N_Port
F_Port
E_Port
E_Port
FIGURE 2
TABLE 2
Port Type
F_Port N_Port E_Port
1.
Port configurations
Access Gateway
Yes Yes NA Connects hosts and targets to Access Gateway. Connects Access Gateway to a fabric switch. ISL is not supported.1
Fabric switch
Yes NA Yes Connects devices, such as hosts, HBAs, and storage to the fabric. N_Ports are not supported. Connects the switch to other switches to form a fabric.
The switch is logically transparent to the fabric, therefore it does not participate in the SAN as a fabric switch.
Fabric
F_A2 Host_3
NPIV enabled
Host_4
F_4 N_3
Host_5
Host_6
F_6
Host_7
F_7
Host_8
F_8
FIGURE 3
TABLE 3
F_Port
F_1, F_2 F_3, F_4 F_5, F_6 F_7, F_8
Access Gateway
Edge switch
Switch_A Switch_A Switch_B Switch_B
F_Port
F_A1 F_A2 F_B1 F_B2
Limited to switch platforms and embedded switch platforms listed in Supported hardware and
software on page xiii.
Maximum number of AGs that can be connected to an Edge switch is 30 Maximum number of devices that can be connected to a Fabric OS switch through AG depends
on the maximum number of local devices supported by Fabric OS.
Downgrades to v6.0.0 or earlier Fabric OS versions are not allowed if any F_Port trunk is
active.
Trunking must be disabled before downgrading to Fabric OS v6.0.0 or earlier. When a switch is set in AG mode, if you downgrade to v6.0.0x, all preferred Failover
settings are lost. The following table describes the scenarios for upgrading and downgrading Fabric OS versions.
TABLE 4
Policies
Auto Port Configuration Port Grouping Port Trunking (with trunk members OFFLINE) Port Trunking (with trunk members ONLINE) Advance Device Security Policy
Yes
Yes
No
Note the following upgrade and downgrade considerations when the Brocade policies are enabled.
Chapter
In this chapter
Access Gateway policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Advanced Device Security policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Automatic Port Configuration policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Failover policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Failback policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Cold Failover policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Port Grouping policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Access Gateway policy enforcement matrix. . . . . . . . . . . . . . . . . . . . . . . . . . 22 Access Gateway trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Configuration management for trunk areas . . . . . . . . . . . . . . . . . . . . . . . . . 28 Access Gateway Cascading. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Advance Device Security policy (ADS) Automatic Port Configuration policy (APC) Port Grouping policy (PG)
NOTE
The maximum device entries allowed in the Allow List is twice the per port max login count Each port can be configured to not allow any device or to allow all the devices to log in If the ADS policy is enabled, by default, every port is configured to allow all devices to log in
10
The same Allow List can be specified for more than one F_Port.
This example show how to set the list of allowed devices for ports 1, 10, and 13 to all access: 1. Connect to the switch and log in as admin. 2. Enter the ag --adsset 1;10;13* command.
switch:admin> ag-adsset1;10;13* WWN list set successfully as the Allow Lists of the F_Port[s]
1. Connect to the switch and log in as admin. 2. Enter the ag --adsdel 3;9 "22:03:08:00:88:35:a0:12;22:00:00:e0:8b:88:01:8b" command.
switch:admin> ag --adsdel "3;9" "22:03:08:00:88:35:a0:12;22:00:00:e0:8b:88:01:8b" WWNs removed successfully from Allow Lists of the F_Port[s]Viewing F_Ports allowed to login
11
1. Connect to the switch and log in as admin. 2. Enter the ag --adsadd "3;9" "20:03:08:00:88:35:a0:12;21:00:00:e0:8b:88:01:8b" command.
switch:admin> ag --adsadd "3;9" "20:03:08:00:88:35:a0:12;21:00:00:e0:8b:88:01:8b" WWNs added successfully to Allow Lists of the F_Port[s]
ATTENTION
Enabling the APC policy is disruptive to F_Ports and N_Ports. You must disable the module before you enable the APC policy because when you enable the APC policy, existing F_Port-to-N_Port mappings are deleted. Because the APC policy enforcement erases port mappings existing on the switch, it is recommended to perform a configupload before enabling the APC policy. After you enable the APC policy, the policy immediately takes effect; a reboot is not required. When you disable the APC policy, the N_Port configuration and the F_Port-to-N_Port mapping revert back to the default factory configuration for that platform. The APC policy is mutually exclusive with the Port Grouping policy. When the APC policy is enabled on a switch connected to multiple fabrics, no attempt is made by AG to restrict failover behavior even if the N_Ports are connected to unrelated fabrics. Do not to use the APC policy when Access Gateway is connected to multiple fabrics.
12
When in Access Gateway mode, the Automatic Port Configuration policy may not work when attached to M-EOS switches. M-EOS ports should be set to G_Port to prevent problems with port type discovery. Ports 16-47 on the FC8-48 blade may not be used for AG F_Port Trunking connections.
NOTE
4. Enter the configupload command to save the switchs current configuration. 5. At the command prompt, type Y to enable the policy. The switch is ready; a reboot is not required.
NOTE
Because of the disruption caused by the redistribution of F_Ports, it is recommended to add new N_Ports to the module. For more information on adding N_Ports, see Adding an N_Port to a port group on page 20.
13
Failover policy
Failover policy
Access Gateway Failover and Failback policies ensure maximum uptime for the servers. When a port is configured as an N_Port and if by default, the Failover policy is enabled, F_Ports are not disabled if its N_Port goes off line. If you specify a Preferred Secondary N_Port for any of the F_Ports, and if the N_Port goes offline, the F_Ports will fail over to the Preferred Secondary N_Port, and then re-enable. The specified Preferred Secondary N_Port must be online; otherwise, the F_Ports will become disabled. Alternatively, if a Preferred Secondary N_Port is not set for any of F_Ports, the F_Ports will fail over to other online N_Ports belonging to the same N_Port group, and then re-enable. The FLOGI and FDISC requests are forwarded from F_Ports through the new N_Port. If multiple N_Ports are available as candidates for failover, Access Gateway selects one or more N_Ports so that the F_Ports are evenly balanced across all the N_Ports. Failover of F_Ports to new a N_Port generates a RASLOG message. The Failover policy allows hosts to automatically remap to an online N_Port if the primary N_Port goes offline. The Failover policy is enabled (or enforced) during power-up. The Failover policy evenly distributes the F_Ports that are mapped to an offline N_Port among all the online N_Ports. The Failover policy is a parameter of each N_Port. By default, the Failover policy is enabled for all N_Ports. The following sequence describes how a failover event occurs:
NOTE
An N_Port goes offline. All F_Ports mapped to that N_Port are disabled. If the N_Port Failover policy is enabled, and a Preferred Secondary N_Port is specified for the
F_Port and that N_Port is online, the F_Port fails over to the respective Preferred Secondary N_Port, and then re-enables.
NOTE
The Preferred Secondary N_Port is defined per F_Port. For example, if two F_Ports are mapped to a primary N_Port1, you can define a secondary N_Port for one of those F_Ports and not define a secondary N_Port for the other F_Port. Typically, this is done by the server administrator. You must determine whether you want to define a preferred secondary map for each of the servers or just a subset of the servers.
If the Preferred Secondary N_Port is not online, those F_Ports are disabled. If the Preferred Secondary N_Port is not set for any of the F_Ports, those F_Ports will fail over
to other available N_Ports belonging to the same N_Port group, and then re-enable.
This example shows the failover behavior in a scenario where two fabric ports go offline, one after the other. Note that this example assumes that no Preferred Secondary N_Port is set for any of the F_Ports.
First the Edge switch F_A1 port goes offline, as shown in Figure 4 on page 15 Example 1 (left),
causing the corresponding Access Gateway N_1 port to be disabled. The ports mapped to N_1 fail over; F_1 fails over to N_2 and F_2 fails over to N_3.
14
Failover policy
Next the F_A2 port goes offline, as shown in Figure 4 on page 15 Example 2 (right), causing
the corresponding Access Gateway N_2 port to be disabled. The ports mapped to N_2 (F_1, F_3, and F_4) fail over to N_3 and N_4. Note that the F_Ports are evenly distributed to the remaining online N_Ports and that the F_2 port did not participate in the failover event.
Example 1 Hosts Host_1 Access Gateway F_1 Fabric Edge Switch (Switch_A) Host_2 F_2 N_1 Host_3 F_3 F_A2 N_2 Host_4 F_4 Edge Switch (Switch_B) Host_5 F_5 N_3 Host_6 F_6 N_4 Host_7 F_7 F_B1
NPIV enabled NPIV enabled
F_A1
NPIV enabled
Host_2
F_2 N_1
F_A1
NPIV enabled
Host_3
Host_4
Host_5
F_5 N_3
F_B1
NPIV enabled
F_B2
NPIV enabled
Host_6
F_6 N_4
F_B2
NPIV enabled
Host_7
F_7
Host_8
F_8
Host_8
F_8 Legend
Physical connection Mapped online Failover route online Original mapped route (offline)
FIGURE 4
3. Enter the ag command with the --failoverenable <n_portnumber> operand to enable failover.
switch:admin> ag --failoverenable 13 Failover policy is enabled for port 13
15
Failback policy
Failback policy
The Failback policy automatically reroutes the F_Ports back to the primary mapped N_Ports as those N_Ports come back online, if the Failback policy is enabled for the N_Port. Only the originally mapped F_Ports fail back. In the case of multiple N_Port failures, only F_Ports that were mapped to the recovered N_Port experience failback. The remaining F_Ports are not redistributed among the online N_Ports during the failback. If the APC policy is enabled, by default, the failback policy is disabled. The Failback policy is an N_Port parameter. By default, the Failback policy is enabled. The following sequence describes how a failback event occurs:
NOTE
When an N_Port comes back online, with the Failback policy enabled, the F_Ports that were
originally mapped to it are disabled.
The F_Port is rerouted to the primary mapped N_Port, and then re-enabled. The host establishes a new connection with the fabric.
Example: Failback Policy
In Example 3, described in Figure 5 on page 17, the Access Gateway N_1 remains disabled because the corresponding F_A1 port is offline. However, N_2 comes back online. See Figure 4 on page 15 for the original fail over scenario. The ports F_1 and F_2 are mapped to N_1 and continue routing to N_3. Ports F_3 and F_4, which were originally mapped to N_2, are disabled and rerouted to N_2, and then enabled.
16
Failback policy
Example 3
Fabric
Host_2
F_2
NPIV enabled
Host_4
F_4 N_3
Host_5
Host_6
F_6
Host_7
F_7
Legend
Physical connection Mapped online Failover route online Original mapped route (offline)
Host_8
F_8
FIGURE 5
3. Enter the ag --failbackenable command with the n_portnumber operand to enable failover.
switch:admin> ag --failbackenable 13 Failback policy is enabled for port 13
3. Enter the ag --failbackdisable command with the n_portnumber operand to disable failover.
switch:admin> ag --failbackdisable 13
17
F_Port1 N_Port1
Fabric-1
F_Port2
Storage Array
AG
F_Port3 N_Port2
PG0
Fabric-2
F_Port4
FIGURE 6
18
Figure 7 shows that if you create port groups and when an N_Port goes offline, the F_Ports being routed through that port will fail over to any of the N_Ports that are part of that port group and are currently active. For example, if N_Port4 goes offline then F_Ports7 and 8 are routed through to N_Port 3 as long as N_Port 3 is online because both N_Ports3 and 4 belong to the same port group, PG2. If no active N_Ports are available, the F_Ports are disabled. The F_Ports belonging to a port group do not failover to N_Ports belonging to another port group.
N_Port1
Fabric-1
N_Port2
Storage Array-1
AG
F_Port5 F_Port6 F_Port7 F_Port8 N_Port4 N_Port3
PG1
Fabric-2
Storage Array-2
PG2
FIGURE 7
When a dual redundant fabric configuration is used, F_Ports connected to a switch in AG mode can access the same target devices from both of the fabrics. In this case, you must group the N_Ports connected to the redundant fabric into a single port group. It is recommended to have paths fail over to the redundant fabric when the primary fabric goes down.
F_Port1 N_Port1
Fabric-1
Storage Array-1
F_Port2
AG
F_Port3 N_Port2
PG1
Fabric-2
F_Port4
Storage Array-2
FIGURE 8 ATTENTION
If N_Ports are connected to unrelated fabrics are grouped together, N_Port failover within a port group can cause the F_Ports to connect to a different fabric and the F_Ports may lose connectivity to the targets they were connected to before the failover, thus causing I/O disruption as shown in Figure 8.
19
You can create new port groups and add N_Ports to those groups. However, all N_Ports that are not part of any user-created port group are part of the default port group pg0. Because port groups cannot be overlapped, if you specify an N_Port as a Preferred Secondary N_Port and it already belongs to another port group, the Port Group creation fails. If the PG policy is disabled while a switch in AG mode is online, all the user-defined port groups are deleted, but the F_Port-to-N_Port mapping remain unchanged.
NOTE
3. Enter the command ag --pgshow to verify the port group was created.
switch:admin> ag --pgshow Port Group ID Port Group Name -----------------------------------0 None pg0 2 0;2 SecondFabric 3 1;3 FirstFabric ------------------------------------
3. Enter the command ag --pgshow to verify the N_Port was added to the specified port group.
switch:admin> ag --pgshow PG_ID N_Ports PG_Name ----------------------------------------------------------------------------0 15 pg0 3 12;13;14 Test -----------------------------------------------------------------------------
20
3. Enter the command ag --pgshow to verify the N_Port was deleted from the specified port group.
switch:admin> ag --pgshow PG_ID N_Ports PG_Name ----------------------------------------------------------------------------0 13;15 pg0 3 12;14 Test -----------------------------------------------------------------------------
3. Enter the command ag --pgshow to verify the port group has been deleted.
switch:admin> ag --pgshow PG_ID N_Ports PG_Name ----------------------------------------------------------------------------0 12;13;14;15 pg0 -----------------------------------------------------------------------------
3. Enter the command ag --pgshow to verify the port group has been renamed.
switch:admin> ag --pgshow PG_ID N_Ports PG_Name -------------------------------------0 None pg0 2 0;2 MyEvenFabric 3 1;3 FirstFabric
3. Enter the command ag --pgshow to verify the Port Group policy is disabled.
switch:admin> ag --policyshow AG Policy Policy Name State ---------------------------------------------------------Port Grouping pg Disabled
21
Auto Port Configuration auto Disabled Advance Device Security ADS Disabled ----------------------------------------------------------
TABLE 5
Policies
Port Grouping
Mutually exclusive N/A Can coexist Can co-exist
N_Port Trunking
Can co-exist Can co-exist N/A Can co-exist
ADS Policy
Can co-exist Can co-exist Can co-exist N/A
When one or more N_Ports in a trunk group goes offline, there is no change in the PID for the
F_Port(s) that were mapped to the N_Port(s) as long as at least one N_Port in the trunk group is active. This provides for a transparent failover and failback within the trunk group.
Trunked links are more efficient because of the trunking algorithm implemented in the
switching ASICs that distributes the I/O more evenly across all the links in the trunk group.
Trunk groups cannot span across multiple N_Port groups within an AG module in AG mode. Multiple trunk groups are allowed within the same N_Port group.
On the Edge switch, this feature is called F_Port trunking or masterless F_Port trunking. Because the entire configuration for AG Trunking is done on the Edge switch, the information here is applicable to the Edge switch module and not the AG module. The only requirements on the AG module is to ensure that the ISL Trunking license is installed. Because you must configure the trunking on the Edge switch, F_Port trunking provides a Trunk group between N_Ports on the AG module and F_Ports on the Edge switch module. This feature keeps AGs F_Port(s) from becoming disabled in the case where an N_Port within the trunk group fails. No failover occurs as long as there is at least one active link in the trunk group. With trunking, any link within a trunk can go off line or become disabled, but the trunk remains fully functional and no re-configuration is required.
NOTE
22
Trunking prevents reassignments of the Port ID (also referred to as the Address Identifier as described in Table 7 on page 26) when N_Ports go offline. You must install the Brocade ISL license on both the Edge switch and the module running in AG mode and you must ensure that both modules running Fabric OS v6.1.0 or later. All ports within a trunk group must be part of the same port group; ports outside of a port group cannot form a trunk group. For more information on Port Groups, see Port Grouping policy on page 18. If a switch already has an ISL Trunking license, no new license is required to use it on AG N_Port masterless trunking; Also, after a trunking license is installed on a switch in AG mode and you change the switch to standard mode, you can keep the same license. Access Gateway does not work on M-EOS or third party switches. To implement F_Port masterless trunking on the Edge switch, you must first configure an F_Port Trunk group and statically assign an Area_ID within the trunk group. Assigning a Trunk Area (TA) to a port or trunk group enables F_Port masterless trunking on that port or trunk group. When a TA is assigned to a port or trunk group, the ports will immediately acquire the TA as the area of its process IDs (PID). And when a TA is removed from a port or trunk group, the port reverts to the default area as its PID.
NOTE
Authentication
Authentication occurs only on the F_Port trunk master port and only once per the entire trunk. This behavior is same as E_Port trunk master authentication. Because only one port in the trunk does FLOGI to the switch, and authentication follows FLOGI on that port, only that port displays the authentication details when you issue the portshow command. Note: Switches in Access Gateway mode do not perform authentication.
Management Server
Registered Node ID (RNID), Link Incident Record Registration (LIRR), and (QSA) Query Security Attributes ELSs are not supported on F_Port trunks. The port must be disabled before assigning a Trunk Area on the Edge switch to the port or removing a Trunk Area from a trunk group. You cannot assign a Trunk Area to ports if the standby CP is running a firmware version earlier than Fabric OS v6.2.0.
Trunk area
23
TABLE 6
Category
PWWN
Downgrade
Upgrade HA Sync
No limitations on upgrade to Fabric Os v6.1.0 if the F_Port is present on switch. Upgrading is not disruptive. If you plug in a standby-CP with a firmware version earlier than Fabric OS v6.1.0 and a Trunk Area is present on the switch, the CP blades will become out of sync. Only F_Port trunk ports are allowed on a Trunk Area port for Fabric OS v6.1.0. All other port types that include F/FL/E/EX are persistently disabled in Fabric OS v6.1.0. Port X is a port that has its Default Area the same as its Trunk Area. The only time you can remove port X from the trunk group is if the entire trunk group has the Trunk Area disabled. portCfgTrunkPort <port>, 0 will fail if a Trunk Area is enabled on a port. The port must be Trunk Area disabled first. switchCfgTrunk 0 will fail if a port has TA enabled. All ports on a switch must be TA disabled first. When you assign a Trunk Area to a trunk group, the Trunk Area cannot be port swapped; if a port is swapped, then you cannot assign a Trunk Area to that port. No more than one trunk master in a trunk group. The second trunk master will be persistently disabled with reason "Area has been acquired. When you assign a Trunk Area to a trunk group, the trunk group cannot have fast write enabled on those ports; if a port is fast write enabled, the port cannot be assigned a Trunk Area. FICON is not supported on F_port trunk ports. However, FICON can still run on ports that are not F_Port trunked within the same switch. F_Port masterless trunking is supported on ports 16-43 on the FC8-48 blade. On the FC8-48 and FC4-48C blades F_Port trunking supported only on ports 0 - 15. If an FC4-32 (Electron) blade has the Trunk Area enabled on ports 16 - 31 and the blade is swapped with an FC4-48C and FC8-48 blade, the Trunk Area ports will be persistently disabled. You can run the porttrunkarea command to assign a Trunk Area on those ports. You must first enable Trunking on the port before the port can have a Trunk Area assigned to it.
Port Types
Default Area
Trunk Master
Fast Write
FICON
FC4-32 blade
Trunking
24
TABLE 6
Category
PID format
Long Distance
F_Port trunks are not allowed on ICL Ports. The porttrunkarea command does not allow it. You cannot create a Trunk Area on ports with different Admin Domains. You cannot create a Trunk Area in AD255. DCC policy enforcement for the F_Port trunk is based on the Trunk Area; the FDISC requests to a trunk port is accepted only if the WWN of the attached device is part of the DCC policy against the TA. The PWWN of the FLOGI sent from the AG will be dynamic for the F_Port trunk master. Because you do not know ahead of time what PWWN AG will use, the PWWN of the FLOGI will not go through DCC policy check on an F_Port trunk master. However, the PWWN of the FDISC will continue to go through DCC policy check. Creating a Trunk Area may remove the Index ("I") from the switch to be grouped to the Trunk Area. All ports in a Trunk Area share the same "I". This means that Domain,Index (D,I), which refer to an "I", that might have been removed, will no longer be part of the switch. Note: Ensure to include AD, zoning and DCC when creating a Trunk Area. You can remove the port from the Trunk Area to have the "I" back into effect. D,I will behave as normal, but you may see the effects of grouping ports into a single "I". Also, D,I continues to work for Trunk Area groups. The "I" can be used in D,I if the "I" was the "I" for the Trunk Area group. Note: I refers to Index and D,I refers to Domain,Index.
Two masters is not supported in the same F_Port trunk group. Not currently supported.
25
The following table describes the PWWN format for F_Port and N_Port trunk ports.
TABLE 7
NAA = 2
NAA = 2
26
TABLE 8
23 22 21
Address identifier
20 19 18 17 16 15 14 13 12
Area_ID Address Identifier
11
10
7 6
Port ID
1 0
Domain ID
1. Connect to the switch and log in as admin. 2. Disable the ports to be included in the TA. 3. Enable TA for ports 13 and 14 on slot 10 with port index of 125:
switch:admin> porttrunkarea --enable 10/13-14 -index 125 Trunk index 125 enabled for ports 10/13 and 10/14
27
If you have AD1: 3,7; 3,8; 4,13; 4,14 and AD2: 3,9; 3,10, and then create a TA with Index 8 with ports that have index 7, 8, 9, and 10. Then index 7, 9, and 10 are no longer with domain 3. This means that AD2 does not have access to any ports because index 9 and 10 no longer exist on domain 3. This also means that AD1 no longer has 3,7in effect because Index 7 no longer exists for domain 3. AD1's 3,8, which is the TA group, can still be seen by AD1 along with 4,13 and 4,14. A port within a TA can be removed, but this adds the Index back to the switch. For example, the same AD1 and AD2 with TA 8 holds true. If you remove port 7 from the TA, it adds Index 7 back to the switch. That means AD1's 3,7 can be seen by AD1 along with 3,8; 4,13 and 4,14.
3. Re-enable ports 36-39 by executing portenable port for each port in the TA. 4. Show switch/port information:
switch:admin> switchshow switchName: SPIRIT_B4_01
28
switchType: 66.1 switchState: Online switchMode: Native switchRole: Principal switchDomain: 2 switchId: fffc02 switchWwn: 10:00:00:05:1e:41:22:80 zoning: OFF switchBeacon: OFF FC Router: ON FC Router BB Fabric ID: 100 Area Port Media Speed State Proto ===================================== 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 --------id -----------------------id id id id id id id id N8 N8 N8 N8 N8 N8 N8 N8 N4 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N8 N4 N4 N4 N4 N4 N4 N4 N4 No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module Online No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Module No_Light No_Light No_Light No_Light Online Online Online Online
F-Port
10:00:00:00:00:01:00:00
29
Disable each port prior to removing ports from the TA. Then reissue the command:
switch:admin> porttrunkarea --disable 36-39 Trunk area 37 disabled for ports 36, 37, 38 and 39.
30
FIGURE 9
Ports are connected between the two AG switches, which are connected to each other. AG cascading connections between devices increase the network use because cascading provides higher over-subscription while allowing you to consolidate the number of ports going to the main fabric. There is no license requirement to use this feature. The configuration considerations when cascading Access Gateway modules/switches are:
You can enable the Port Grouping (PG) policy on both the Edge and Core AG switches. Only one level of cascading is supported. Note that several Edge AGs can connect into a single
Core AG to support higher consolidation ratios.
AG trunking between the Edge and Core AG switches is not supported. Trunking between the
Core AG switch and the fabric is supported.
It is recommended you enable the Advanced Security Policy (ADS) on the AG F_Ports that are
directly connected to the servers.
APC policy is not supported when cascading. Loopbacks (Core AG N_port to Edge AG F_Port) are not allowed. The agshow command issued on the fabric will discover only the Core AG switches. If issued as
agshow --name <AG Name>, then the F_ports of both the Core and Edge AG switches will be shown for the Core AG switch.
31
32
Chapter
In this chapter
Connectivity of multiple devices overview . . . . . . . . . . . . . . . . . . . . . . . . . . . Fabric and Edge switch configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Connectivity to Cisco Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Access Gateway mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rejoining switches to a fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
33 33 35 40 43
M-EOSc v9.6.2 or later and M-EOSn v9.6 Cisco v3.0(1) or later, v3.1(1) or later, and v3.2(1) or later. Only FCP initiator ports can be connected to a switch in AG mode as F_Ports. FCP target ports
are supported if a switch in AG mode is connected to an external switch. Loop devices and FICON channels/control unit connectivity are not supported.
When a switch is in AG mode, it can be connected to NPIV-enabled HBAs, or F_Ports that are
NPIV-aware. Access Gateway supports NPIV industry standards per FC-LS-2 v1.4.
Install and configure the switch as described in the switchs Hardware Reference Manual
before performing these procedures.
Verify that the interop mode parameter is set to 0, Brocade Native mode, or the switch mode is
in Native mode.
Configure the F_Ports on the Edge switch to which Access Gateway is connected as follows: Enable NPIV. Disable long distance mode.
33
Allow multiple logins. The recommended fabric login setting is the maximum allowed per
port and per switch.
Use only WWN zoning throughout the fabric. Access Gateway does not support domain ID and
other types of zoning schemes.
Include the Access Gateway WWN or the port WWN of the N_Ports, also include the HBA WWNs
that will be connected to AG F_Ports to the ACL list in ACL policies.
Allow inband queries for forwarded fabric management requests from the hosts. Add the
Access Gateway switch WWN to the access list if inband queries are restricted. Before connecting Access Gateway to a Fabric OS fabric, disable the Fabric OS Management Server Platform Service.
NOTE
F-Port F-Port
50:06:0b:00:00:3c:b7:32 10:00:00:00:c9:35:43:f5
Disabled (Persistent) F-Port 50:06:0b:00:00:3c:b4:3e F-Port 10:00:00:00:c9:35:43:f3 Disabled (Persistent) Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled (Persistent) (Persistent) (Persistent) (Persistent) (Persistent) (Persistent) (Persistent) (Persistent)
34
20 20 21 21 master) 22 22 23 23
-id id id
N4 N4 N4 N4
segmented,(zone conflict)(Trunk (Trunk port, master is Port 21 ) (Trunk port, master is Port 21 )
See Table 10 on page 41 for a description of the port state. If the switch is in Native mode, you can enable AG mode; otherwise, set the switch to Native mode, and then reboot the switch.
3. Save the switch configuration using the configUpload command. a. b. Verify that the FTP service is running on the host computer. Enter the configUpload command. The command becomes interactive and you are prompted for the required information. 4. Enter the configure command and verify that interop mode is set to 0.
3. Enable NPIV functionality on the Edge fabric ports so that multiple logins are allowed for each port. Enter the following command on the M-EOS switch to enable NPIV on the specified ports.
config NPIV
NOTE
You can run the agshow command to display Access Gateway information registered with the fabric. When an Access Gateway is exclusively connected to Non-FOS based switches, it will not show up in the agshow output on other Brocade Switches in the fabric.
35
In this case, you must configure the Cisco switch using the Cisco provided procedures to ensure interoperability with Access Gateway. If you are using Emulex HBAs or any other HBAs that are not based on QLogic FC ASIC technology, ensure that N_Port ID Virtualization (NPIV) is enabled on the Cisco switch and that the switch is running SAN-OS 3.0 (1) or SAN-OS 3.1 (1) or later. By default, NPIV is enabled per switch and not per port.
Two FCIDs with the same lower 8 bits on the same N_Port (for example, 0xaabb02 and
0xccdd02)
A "00" in the ALPA/Port_ID field of the FCID, which is returned for F_Ports logins (that is, server
HBA logins behind AG, also known as FDISC logins. If either of these two situations is detected, the switch in AG mode persistently disables the server ports with the reason code "Duplicate ALPA detected."
4. Press Ctrl-Z to exit. 5. Enter the following commands to save the MDS switch connection:
copy run start
Your Cisco switch is now ready to connect to a switch in Access Gateway mode.
36
NOTE
You must set the fcinterop FC ID allocation scheme to auto and use the company ID list and persistent FC ID configuration to manipulate the FC ID device allocation. Table 9 shows the Cisco Company ID list, which shows the OUI ID as the three middle bytes of the World Wide Name (WWN). This OUI ID format is used for initiator devices.
TABLE 9
00:E0:8B 00:09:6B 00:11:25 00:50:8B
For detailed documentation on the FCID allocation for HBAs, go to: http://www.cisco.com/en/US/docs/storage/san_switches/mds9000/sw/rel_2_x/san-os/configu ration/guide/adv.html#wp1127676
37
00:E0:8B * <- Explicitly deleted entry (from the original default list) Total company ids 6 + - Additional user configured company ids * -Explicitly deleted company ids from default list.
3. Enter the following command to delete the OUI ID 0x445566 from list:
no fcid-allocation area company-id 0x445566
5. Press Ctrl-Z to exit. 6. Issue the following command to save the MDS switch configuration.
copy run start
Ensure that the OUI IDs of the attached target devices are listed in the updated Company ID List. After you update the list, you are ready to connect the Access Gateway device. If any of the AG server ports (F_Ports) report that the port is disabled with reason code Duplicate ALPA Detected, then use the follow considerations:
Ensure that the debug FLOGI mode is not enabled; Cisco does not support NPIV when FLOGI
debug is set. Run the show debug flogi command to verify that the FLOGI mode is not enabled. If the FLOGI mode is enabled, you must disable it using the following FLOGI debug commands:
config t no flogi debug Press Ctrl-Z to exit copy run start Saves MDS switch configuration
By default, if this is a new or an existing VSAN to use with the switch in Access Gateway mode,
the default policy for access is "deny." Either set it to "permit" or zone the devices for access.
Access Gateway is compatible with Cisco VSAN, Dynamic Port VSAN (DVPM), and Inter-VSAN
Routing (IVR) features; however, you may need to use the AG Port Grouping policy to take full advantage of these MDS features. For more information on the Port Grouping policy, see the Port Grouping policy on page 18.
38
4. Press Ctrl-Z to exit. 5. Enter the following command to save the MDS switch configuration:
copy run start
NOTE
If there are any device(s) in the VSAN that you suspend, it takes that device offline until you unsuspend that VSAN.
You can also use the Persistent FCID field in the Cisco GUI tool to manually assign the FCIDs to QLogic-based devices behind the Access Gateway module. If you use the method, ensure that proper FCIDs are assigned, which have a different Area field from the target devices connected to the same MDS switch. See Access Gateway routing requirements with Cisco fabrics on page 36 to ensure that the switch meets the AG routing requirements.
NOTE
39
NOTE
The switch automatically reboots and comes back online in AG mode using a factory default F_Port-to-N_Port mapping. For more information on AG default F_Port-to-N_Port mapping, see Table 11 on page 53. 2. Enter the ag --modeshow command to verify that AG mode is enabled.
switch:admin> ag --modeshow Access Gateway mode is enabled.
3. Enter the ag --mapshow command without any options to display all the mapped ports. The ag --mapshow command shows all the N_Ports (with the portcfgnport value of 1) even if those N_Ports are not connected.
switch:admin> ag --mapshow N_Port Configured_F_Ports Current_F_Ports Failover Failback PG_ID PG_Name ----------------------------------------------------------------------------0 4;5;6 4;5;6 1 0 2 SecondFabric 1 7;8;9 7;8;9 0 1 0 pg0 2 10;11 10;11 1 0 2 SecondFabric 3 12;13 12;13 0 1 0 pg0 -----------------------------------------------------------------------------
40
4. Enter the switchShow command without any options to display the status of all ports.
switch:admin> switchshow switchName: switch switchType: 43.2 switchState: Online switchMode: Access Gateway Mode switchWwn: 10:00:00:05:1e:03:4b:e7 switchBeacon: OFF
Area Port Media Speed State Proto ===================================== 0 0 -N4 No_Module 1 1 cu N4 Online 2 2 cu N4 Online 3 3 cu N4 Online 4 4 cu N4 Online 5 5 cu N4 Online 6 6 cu N4 Online 7 7 cu AN No_Sync 8 8 cu N4 Online 9 9 cu AN No_Sync 10 10 cu AN No_Sync 11 11 cu AN No_Sync 12 12 cu AN No_Sync 13 13 cu AN No_Sync 14 14 cu AN No_Sync 15 15 cu AN No_Sync 16 16 cu AN No_Sync 17 17 -N4 No_Module 18 18 -N4 No_Module 19 19 id N4 No_Light 20 20 -N4 No_Module 21 21 id N4 Online 22 22 id N4 Online 23 23 id N4 Online
F-Port 50:06:0b:00:00:3c:b7:32 F-Port 10:00:00:00:c9:35:43:f5 F-Port 50:06:0b:00:00:3c:b6:1e F-Port 10:00:00:00:c9:35:43:9b F-Port 50:06:0b:00:00:3c:b4:3e F-Port 10:00:00:00:c9:35:43:f3 Disabled (Persistent) F-Port 10:00:00:00:c9:35:43:a1 Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent)
Port States
The following table describes the possible port states.
TABLE 10
State
No _Card No _Module Mod_Val Mod_Inv No_Light No_Sync In_Sync Laser_Flt Port_Flt
41
TABLE 10
State
Diag_Flt Lock_Ref Testing Offline Online
NOTE
To save the Access Gateway configuration, use the configUpload command before proceeding with the next step. 4. Enter the ag command with the --modedisable operand to disable AG mode.
switch:admin> ag --modedisable
The switch automatically reboots and comes back online using the fabric switch configuration; the AG parameters, such as F_Port-to-N_Port mapping, and the Failover and Failback policies are automatically removed. 5. Enter the ag --modeshow command to verify that AG mode is disabled.
switch:admin> ag --modeshow Access Gateway mode is NOT enabled
42
If you saved a Fabric OS configuration before enabling AG mode, download the configuration
using the configDownload command.
If you want to re-join the switch to the fabric using the fabric configuration, use the following
procedure. 1. Connect to the switch and log in as admin. 2. Enter the switchDisable command to disable the switch. 3. Enter the defZone --allAccess command to allow the switch to merge with the fabric. 4. Enter the cfgSave command to commit the defzone changes. 5. Enter the switchEnable command to enable the switch and allow it to merge with the fabric. The switch automatically re-joins the fabric.
43
44
Chapter
In this chapter
Port Initialization in Access Gateway mode . . . . . . . . . . . . . . . . . . . . . . . . . . 45 N_Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Port configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Enabled (online) if the port receives a fabric login event and is connected to an F_Port of
an Edge switch that supports NPIV (N_Port ID Virtualization).
Disabled (offline) if the port is not connected to a fabric or is connected to a fabric port
that does not support NPIV. 2. All F_Ports mapped to online N_Ports are enabled. 3. F_Ports mapped to an offline N_Port with the failover policy enabled fail over to an online N_Port. 4. The host logs into the fabric as follows: a. b. c. d. e. The host sends a FLOGI (fabric login) request. Access Gateway converts the FLOGI request into an FDISC request to the fabric with the same parameters as the host. The fabric processes the request and sends an FDISC response. Access Gateway converts the FDISC Accept link service reply (ACC) response to the host as an FLOGI ACC using the same parameters as the fabric. The host receives the response from the fabric. Figure 10 shows Access Gateway logically transparent to the host and the fabric after ports are initialized.
45
N_Ports
b d e
FIGURE 10
You can expand your fabric by configuring the F_Ports to connect to the fabric as N_Ports, which increases the number of device ports you can connect to a single fabric port. You can connect AG to more than one fabric. When AG is connected to at least one Edge switch in the fabric, Fibre Channel ports operate as either a target or as an initiator. Fibre Channel ports target ports can also connect to AG as F_Ports. The following combinations are possible with initiators and targets:
All F_Ports connect to the FCP initiator port. All F_Ports connect to the FCP target port. Some F_Ports connect to the FCP initiator port and some connected to FCP target port. Targets and hosts that are connected to the same AG are not supported.
N_Ports
The AG port connected to the Enterprise fabric must be configured as an N_Port using the portcfgnport mode command. By default, on embedded switches, only the internal ports of Access Gateway are configured as F_Ports. All external ports are configured (locked) as N_Ports. For more information on which ports are mapped by default, see Table 11 on page 53. The internal ports connect hosts in the bladed server and external ports connect to the fabric. The enabled N_Port will automatically come online if it is connected to an Enterprise fabric switch that supports NPIV. NPIV capability should be enabled on the ports connected to the Access Gateway. Use the portcfgnpivport command to enable NPIV capability on the specific port. By default, NPIV is enabled on 8 Gbps switches.
NOTE
If NPIV is disabled on the Brocade Edge switch after the Access Gateway N_port is logged in, the N_port on the Access Gateway will not be logged out if NPIV devices have not logged in using that N_port. In this case you must manually disable the N_port on the Access Gateway. See the Fabric OS Administrators Guide for more information.
NOTE
A switch in Access Gateway mode must have at least one port configured as an N_Port. Therefore, the maximum number of F_Ports that can be mapped to an N_Port is the number of ports on the switch minus one.
46
N_Ports
Figure 11 shows a host connected to an embedded switchs external F_Port when Access Gateway is enabled. The configured F_Port is mapped to an N_Port.
FIGURE 11
Unlocking N_Ports
Unlocking the N_Port configuration automatically changes the port to an F_Port. When you unlock an N_Port, the F_Ports are automatically unmapped and disabled. 1. Connect to the switch and log in as admin. 2. Enter the portcfgnport command.
NOTE
The portcfgnport command only works when the Port Grouping policy is enabled.
switch:admin> portcfgnport Ports 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 --------------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+-Locked N_Port .. .. .. .. .. .. .. .. .. .. ON ON ON ON ON ON
3. Enter the portcfgnport command with <portnumber> 0 operand to unlock N_Port mode.
switch:admin> portcfgnport 10 0
Alternatively, to lock a port in N_Port mode, enter the portcfgnport <portnumber> 1 command.
switch:admin> portcfgnport 10 1
47
N_Ports
By default, on embedded switches, all external ports are configured as N_Port lock mode when you enable Access Gateway. Access Gateway connects only FCP initiators and targets to the fabric. It does not support other types of ports, such as ISL (interswitch link) ports. The port types on a fabric switch are not locked. Fabric OS Native mode dynamically assigns the port type based on the connected device: F_Ports and FL_Ports for hosts, HBAs, and storage devices; and E_Ports, EX_Ports, and VE_Ports for connections to other switches.
Use the following parameters: N_Port Configured F_Ports Current F_Ports The numbers of ports locked in N_Port mode. The F_Ports that are mapped to the corresponding N_Port. Shows the F_Ports that are currently connected to the fabric on the corresponding N_Port. In the case of failover, the current F_Ports and configured F_Ports differ. Indicates whether the N_Port policy is enabled (1) or disabled (0). Indicates whether the Port Grouping policy is enabled (1) or disabled (0).
48
N_Ports
F-Port 50:06:0b:00:00:3c:b7:32 F-Port 10:00:00:00:c9:35:43:f5 F-Port 50:06:0b:00:00:3c:b6:1e F-Port 10:00:00:00:c9:35:43:9b F-Port 50:06:0b:00:00:3c:b4:3e F-Port 10:00:00:00:c9:35:43:f3 Disabled (Persistent) F-Port 10:00:00:00:c9:35:43:a1 Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent) Disabled (Persistent)
NOTE
For a description of the port state, see Table 10 on page 41.
49
Port configurations
Port configurations
The following mapping updates and adding and removing of ports are only applicable to the Port Grouping policy.
NOTE
For bladed servers, the HBA connects to the internal ports. Internal ports are F_Ports. By default, only the external ports are configured as N_Ports. 1. Connect to the switch and log in as admin. 2. Enter the ag command with the --mapdel <n_portnumber> <F_Port1;...;F_Port2> operand to remove the F_Port from the N_Port. The f_portlist can contain multiple F_Port numbers separated by semicolons, for example 17;18.
switch:admin> ag --mapdel 10 6 F-Port to N-Port mapping has been updated successfully
3. Enter the switchshow command to verify that the F_Port is free (unassigned). Unassigned F_Port status is Disabled (No mapping for F_Port). See port 6 in the following example.
switch:admin> switchshow switchName: fsw534_4016 switchType: 45.0 switchState: Online switchMode: Access Gateway Mode switchWwn: 10:00:00:05:1e:02:1d:b0 switchBeacon: OFF Area Port Media Speed State Proto ===================================== 0 0 cu AN No_Sync 1 1 cu AN No_Sync 2 2 cu AN No_Sync 3 3 cu AN No_Sync 4 4 cu AN No_Sync 5 5 cu AN No_Sync 6 6 cu AN No_Sync 7 7 cu AN No_Sync 8 8 cu AN No_Sync 9 9 cu AN No_Sync 10 10 -N4 No_Module 11 11 -N4 No_Module 12 12 -N4 No_Module
(N-Port Offline (N-Port Offline (N-Port Offline (N-Port Offline (N-Port Offline (No mapping for
for F-Port) for F-Port) for F-Port) for F-Port) for F-Port) F-Port)
50
Port configurations
13 14 15
13 14 15
id id id
N4 N4 N4
4. Enter the ag command with the --mapadd <n_portnumber> <f_port1;f_port2;...> operand to add the list of F_Ports to the N_Port. The f_portlist can contain multiple F_Port numbers separated by semicolons, for example 17;18.
switch:admin> ag --mapadd 13 "6;7" F-Port to N-Port mapping has been updated successfully
5. Enter the ag --mapshow command with the n_portnumber operand to display the list of mapped F_Ports. Verify that the added F_Ports appear in the list.
switch:admin> ag --mapshow 13 N_Port Failover(1=enabled/0=disabled) Failback(1=enabled/0=disabled) Current F_Ports Configured F_Ports PG_ID PG_Name : : : : : : : 13 1 1 None 6;7 0 pg0
3. Enter the ag --mapshow command with the n_portnumber operand to display a list of mapped F_Ports. Verify that the F_Ports you removed are not in the list.
switch:admin> ag --mapshow 13 N_Port Failover(1=enabled/0=disabled) Failback(1=enabled/0=disabled) Current F_Ports Configured F_Ports PG_ID PG_Name : : : : : : 13 1 1 None 7 0
: pg0
51
Port configurations
52
Port configurations
The following table shows the default F_Port-to-N_Port mapping that is automatically configured when Access Gateway mode is enabled. All N_Ports have failover and failback enabled. All ports must have the POD license active to use Access Gateway on the Brocade 300 and 200E.
.
TABLE 11
Brocade Model
300
F_Ports
0-15
N_Ports
16 -23
200E
16
0-11
12-15
4012
12
07
811
4016
16
09
1015
4018
18
4-11
0-3
4020
20
114
0, 1519
4024
24
116
0, 1723
53
Port configurations
TABLE 11
Brocade Model
4424
F_Ports
17-20
N_Ports
1-8
5424
24
0, 17-23
1-16
5470
20
0, 15-19
1-14
5480
24
0, 17-23
1-16
54
Port configurations
TABLE 11
Brocade Model
5100
F_Ports
32-39
N_Ports
0-31
55
Port configurations
56
Appendix
Troubleshooting
TABLE 12
Problem
Troubleshooting
Cause
Switch is in Native switch mode
Solution
Disable switch using the switchDisable command. Enable Access Gateway mode using the ag --modeenable command. Answer yes when prompted; the switch reboots. Log in to the switch. Display the switch settings using the switchShow command. Verify that the field switchMode displays Access Gateway Mode. On the Edge switch, enter the portCfgShow command. Verify that NPIV status for the port to which Brocade Access Gateway is connected is ON. If the status displays as -- NPIV is disabled. Enter the portCfgNpivPort <port_number> command with the 1 operand to enable NPIV. Repeat step for each port as required. On Brocade Access Gateway, enter the portCfgShow command. For each port that is to be activated as an N_Port, enter the portCfgNport <port_number> command with the 1 operand. All other ports remain as F_Port. To reset the port to an F_Port, enter the portCfgNpivPort <port_number> command with the 0 operand. Verify zoning on the Edge switch. Verify that F_Ports are mapped to an online N_Port. See Access Gateway default F_Port-to-N_Port mapping on page 53. Perform a visual inspection of the cabling, check for issues such as wrong ports, twisted cable, or bent cable. Replace the cable and try again.
Zoning on fabric switch is incorrect. Port mapping on Access Gateway mode switch is incorrect. Cabling not properly connected.
57
Troubleshooting
TABLE 12
Problem
Troubleshooting (Continued)
Cause
Failover disabled on N_Port.
Solution
Verify that failover and failback policies are enabled, as follows: Enter the ag --failoverShow command with the <port_number> operand. Enter the ag --failbackShow command with the <port_number> operand. Command returns Failback (or Failover) on N_Port <port_number> is supported. If it returns, Failback (or Failover) on N_Port <port_number> is not supported. See Adding a preferred secondary N_Port on page 52. Disable switch using the switchDisable command. Disable Access Gateway mode using the ag --modeDisable command. Answer yes when prompted; the switch reboots. Log in to the switch. Display the switch settings using the switchShow command. Verify that the field switchMode displays Fabric OS native mode.
If a Fabric OS switch is in Access Gateway mode and is also set to McDATA Fabric mode, when that switch is connected to an M-EOS switch, the Fabric OS switch does not display in the output when you run the agshow command.
NOTE
58
Index
A
Access Gateway cascading, 30 comparison to standard switches, 4 compatible fabrics, 2 connecting devices, 33 connecting two AGs, 30 description, 1 displaying information, 35 features, 2 mapping description, 6 port mapping, 5 port types, 4 Access Gateway mode comparison, 2 direct target attach, 33 disabling, 42 enabling, 40 port initialization, 45 port types, 4 saving configuration, 42 supported firmware versions, 33 terms, xv ACL policies, settings, 34 adding devices to fabric, 11 Address Identifier, 27 Admin domain, 25 ADS Policy adding devices, 11 disabling, 10 displaying devices, 11, 12 enabling, 10 removing devices, 11 setting devices to login, 10 setting devices to not login, 11 APC Policy connecting to multiple fabrics, 12 disabling, 13 enabling, 13 rebalancing F_Ports, 13 area assignment, 23 authentication, limitations, 23
B
behavior, failover policy, 17
C
Cisco switch adding OUIs, 38 AG routing requirements, 36 Company ID list, 37 deleting OUIs, 37, 38 displaying FCID, 38 editing Company ID list, 37 enabling Flat FCID mode, 39 enabling NPIV, 36 FLOGI support, 38 interoperability with AG, 36 no FC target devices, 37 no target devices on switch, 39 target devices on switch, 39 code, xiv cold failover policy, preferred secondary N_Port, 18
59
commands ag, 42 ag --failbackDisable, 17 ag --failbackEnable, 17 ag --failbackShow, 17, 58 ag --failoverDisable, 16 ag --failoverEnable, 15 ag --failoverShow, 15, 16, 58 ag --mapAdd, 51 ag --mapDel, 50, 51 ag --mapShow, 40, 48, 49, 51 ag --modeDisable, 42, 58 ag --modeEnable, 40, 57 ag --modeShow, 40, 42 cfgSave, 43 configDownload, 43 configUpload, 35, 42 defZone --allAccess, 43 portCfgNpivPort, 57 portCfgNport, 47, 48, 57 portCfgShow, 57 switchDisable, 35, 42, 43, 57, 58 switchEnable, 43 switchMode, 57, 58 switchShow, 34, 41, 49, 50, 57, 58 compatibility, fabric, 33 configuration, show, 48 configurations limitations with configdownload command, 25 re-joining switch to fabric, 43 saving AG configuration, 42 using configdownload command, 43 using configupload command, 42
E
Edge switch FLOGI, 34 long distance mode setting, 33 NPIV, 33 settings, 33 external port, N_Port, 50
F
F_Port adding external port on embedded switch, 47 Address Identifier, 23 disabling trunking, 30 internal ports, 50 mapping, example, 5 mapping, show, 48 maximum number mapped to N_Port, 46 remove, 51 settings, Edge switch, 33 shared area ports, 27 trunking, 22 trunking setup, 26 fabric compatibility, 33 inband queries, 34 join, 43 logins, 34 Management Server Platform, 34 zoning scheme, 34 Fabric OS Management Server Platform Service settings, 34 failback policy example, 14, 16 failover policy disabling, 16 enabling, 15 example, 15, 17 preferred secondary N_Port, 14 failover policy, behavior, 15 fast write limitation, 24 FICON, F_Port trunk ports, 24
D
daisy chaining, 33 DCC policy adding WWN, 28 enabling, 28 limitation creating TA, 25 default area, removing ports, 24 devices attaching multiple devices, 33 direct target attach, 33 Direct Target Attach, 33 Domain,Index, 28 downgrading, 24 considerations, 6
H
HA sync, TA present, 24
60
I
ICL ports, limitations, 25 inband queries, 34 internal port, F_Port, 50
non disruptive, 24 NPIV Edge switch, 33 enable with portcfgnpivport command, 46 enabling on Cisco switch, 36 enabling on M-EOS switch, 35 support, 33
J
join fabric, 43
O
optional features, xvii
L
long distance mode, Edge switch, 33
P
Policies Access Gateway, 9 Advance Device Security, 10 enabling DCC policy, 28 enforcement matrix, 22 Port Grouping, 18 security enforcement, 10 showing current policies, 9 using policyshow command, 9 port comparison, 4 mapping, 5 requirements, 33 types, 4 port group add N_Port, 20 create, 20 delete N_Port, 20 disabling, 21 port group 0, 18 remove port group, 21 rename, 21 Port Grouping policy, using portcfgnport command, 47 port mapping displaying, 48 dynamic mapping, 12 maximum number of F_Ports, 46 verifying, 48 Port mirroring, not supported, 25 port state, description, 41 port swap, not swapping TA, 24 port types, limitations, 24 Preferred, 14
M
management server, 23 mapping example, 5 ports, 5 show, 48 masterless trunking blades not supported, 24 PID format, 25 M-EOS switch, enabling NPIV, 35
N
N_Port AG configurations, 46 displaying configurations, 48 displaying status, 49 external port, 50 F_Port, remove, 51 failover in a PG, 19 mapping example, 5 masterless trunking, 22 maximum number supported, 46 multiple trunk groups, 22 show map, 48 trunk groups, 22 trunking, 22 trunking considerations, 23 unlock, 47 unlocking, 47 native mode setting, 35
61
preferred secondary N_Port cold failover, 18 definition, xvi deleting F_Ports, 52 failover policy, 14 forming groups, 18 not online, 14 online, 14 PWWN format, 26 sharing TA trunk group, 24
Q
QLogic-based devices, workaround, 37
trunk area activate DCC policy, 28 assign, 27 configuration management, 28 disabling, 24 remove ports, 27 standby CP, 23 using the porttrunkarea command, 24 trunk groups, create, 26 trunk master, limitation, 24 trunking enabling, 24, 28 license, 23 monitoring, 30
U
unlock N_Port, 47 upgrading, 24 considerations, 6 with ADS policy enabled, 7 with APC policy enabled, 7 with PG policy enabled, 7
R
removing devices from switch, 11 removing trunk ports, 24 requirements, ports, 33
S
settings ACL policies, 34 FLOGI, 34 inband queries, 34 Management Server Platform, 34 zone, no access, 43 supported hardware and software, xiii switch mode, verify, 34 switchMode Access Gateway mode, 40 Native, 34
Z
zoning schemes, 34 setting, 43
T
terms, xv
62