Sunday, 17 February 2013

How to do zoning on CISCO MDS SAN switches using Command Line Interface (CLI)


How to do zoning on CISCO MDS SAN switches using Command Line Interface (CLI)

In this step by step example to demonstrate How to do zoning on CISCO MDS SAN switches using Command Line Interface (CLI), port 1/24 will be used for server connection and port 2/24 for array port connection. VSAN 100 will be used as the production VSAN. Replace these values to reflect your environment and the follow the naming guidelines you may have for device alias, zone and zoneset at your site.

Connect to the switch using ssh/telnet

1.      Change into configuration mode

config t

2.      Check the vsan database and confirm if the interface is in part of the VSAN

show flogi database int fc1/24

show flogi database int fc2/24

3.      Add the ports into the VSAN if it is not in the database

vsan database

vsan 100 interface fc1/24

vsan 100 interface fc2/24

exit

4.      Create device alias for the interfaces

device-alias database

device-alias name TESTSERVER_hba0 pwwn xx:xx:xx:xx:xx:xx:xx:xx (WWN from interface 1/24)

device-alias name TESTARRAY_port0 pwwn xx:xx:xx:xx:xx:xx:xx:xx (WWN from interface 2/24)

5.      Check that the alias is in pending state to be added

do show device-alias pending-diff

 

6.      Commit device-alias changes

device-alias commit

exit

 

7.      Add a name/ description and enable the ports

int fc1/24

no shut

switchport description TESTSERVER_hba0

int fc2/24

no shut

switchport description TESTARRAY_p0

exit

8.      Create zone

zone name TESTSERVER_hba0_TESTARRAY_p0 vsan 100

member devicealias TESTSERVER_hba0

member devicealias TESTARRAY_p0

exit

9.      Check Active zoneset

show zoneset active

10.   Backup current zoneset (assuming current zoneset is TESTZONESET_Active)

zoneset clone TESTZONESET_Active TESTZONESET_Backup.<Date>  vsan 100

11.    Add new zone member to zoneset

zoneset name TESTZONESET_Active vsan 100

member TESTSERVER_hba0_TESTARRAY_p0

exit

12.    Verify that the zoneset is fully populated

do show zoneset brief vsan 100

13.   Activate zoneset

zoneset activate name TESTZONESET_Active vsan 100

exit

14.   Verify zone activation status

show zone status vsan 100

15.   Ensure that the new zone is part of the active zoneset

show zone name TESTSERVER_hba0_TESTARRAY_p0 active vsan 100

16.   Copy the running config to the startup config

copy run start                                                                               

17.   Repeat the above steps  Fabric B

This concludes the step by step procedure to do zoning on CISCO MDS SAN switches using Command Line Interface (CLI)

 

Thursday, 14 February 2013

How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches


How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches

Large Mainframe environments may have requirements for installing multiple CISCO MDS SAN switches to accommodate the port capacity requirements. Alternatively, there may be requirements to extend the ISLs to a second site for disaster recovery purposes. In these cases, it may be required to create VSANs across multiple switches. Mainframe FICON VSANs have special configuration requirements to establish inter VSAN communication. Following the steps below you can create a FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches.

This post assumes that the protocol or communication is FC and the fiber patch leads are available for attachment to the switch ports. Any work required to complete the connectivity between the switches whether it is cabling or establishing a DWDM link to another site must be taken care prior to attempting the steps below.

The following example configuration will be using “switch_1” port 1/1 and “switch_2” 1/1 for establishing the ISLs and configuring FICON VSAN “101”.

1.      Login to switch_1 and disable switch port 1/1

config t

interface fc1/1

shut

exit

2.      Move port 1/1 to VSAN 1. The physical ISL port must be in VSAN 1. VSAN 101 is going to be created using the ISL links which are in the default VSAN – VSAN1.

 

3.      Set the switch port rate mode, trunk mode and name the port

config t

interface fc1/1

switchport rate mode dedicated

switchport trunk mode on

switchport description ISL_to_switch_2

 

4.      Connect the FC cable to switch port 1/1

5.      Repeat steps 1 to 4 on switch_2

6.      Enable port 1/1 on switch_1

config t

interface fc1/1

no shut

exit

 

7.      Repeat step 6 on switch_2

8.      Create VSAN 101 on switch_1

config t

vsan database

vsan 101

exit

9.      Set static FC domain ID for VSAN 101. Example below uses DID 101. Ensure that the DID is unique in the fabric and is not used elsewhere. Static domain IDs are required for FICON VSAN

 

config t

fcdomain domain 101 static vsan 101

fcdomain restart disruptive vsan 101

exit

10.   Set the load balancing for VSAN 101 to “src-dst-id”, mandatory for enabling FICON VSAN feature

config t

vsan database

vsan 101 loadbalancing src-dst-id

exit

11.   Set the “in-order-gurantee”  for VSAN 101 required for FICON VSANs

config t

In-order-gurantee vsan 101

exit

12.   Enable fabric binding for VSAN 101, mandatory for enabling FICON VSAN feature

config t

fabric-binding activate vsan 101

exit

13.   Now enable FICON protocol on VSAN 101

config t

ficon vsan 101

exit

14.   Repeat steps 8 to 13 on switch_2. Use the same VSAN ID as switch_1 (101) and different domain ID (102) (unique in the fabric) for switch_2

 

15.   Identify the switch wwn of switch_1

show wwn switch

16.   Repeat step 15 on switch_2

17.   Update fabric binding in switch_1 to include the remote switch WWN

config t

fabric-binding database vsan 101

swwn <wwn of remote switch> domain 102 (this is the domain ID of remote switch)

fabric-binding database activate vsan 101

18.   Repeat steps 17 on switch_2, use the swwn and domain id of switch_1

19.   Suspend and restart VSAN 101 on switch_1

config t

vsan database

suspend vsan 101

no suspend vsan 101

exit

 

20.   Repeat step 19 on switch_2

21.   Check and confirm VSAN 101 is spanning across sites

fcdomain vsan 101

22.   Copy running configuration to startup configuration on switch_1

copy run start

23.   Repeat step 22 on switch_2

This concludes the procedure How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches
How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches
How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches

How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches
How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches
How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches
How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches
How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches
How to Create FICON VSAN across Inter Switch Links (ISL) on CISCO MDS SAN switches