Skip to main content
ONTAP MetroCluster

Configuring the Cisco FC switches manually

Contributors netapp-thomi netapp-martyh netapp-ranuk netapp-folivia netapp-aherbin

Each Cisco switch in the MetroCluster configuration must be configured appropriately for the ISL and storage connections.

Before you begin

The following requirements apply to the Cisco FC switches:

  • You must use four supported Cisco switches of the same model with the same NX-OS version and licensing.

  • The MetroCluster configuration requires four switches.

    The four switches must be connected into two fabrics of two switches each, with each fabric spanning both sites.

  • The switch must support connectivity to the ATTO FibreBridge model.

  • You cannot use encryption or compression in the Cisco FC storage fabric. It is not supported in the MetroCluster configuration.

In the NetApp Interoperability Matrix Tool (IMT), you can use the Storage Solution field to select your MetroCluster solution. You use the Component Explorer to select the components and ONTAP version to refine your search. You can click Show Results to display the list of supported configurations that match the criteria.

About this task

The following requirement applies to the Inter-Switch Link (ISL) connections:

  • All ISLs must have the same length and same speed in one fabric.

    Different lengths of ISLs can be used in the different fabrics. The same speed must be used in all fabrics.

The following requirement applies to the storage connections:

  • Each storage controller must have four initiator ports available to connect to the switch fabrics.

    Two initiator ports must be connected from each storage controller to each fabric.

    Note

    You can configure FAS8020, AFF8020, FAS8200, and AFF A300 systems with two initiators ports per controller (a single initiator port to each fabric) if all of the following criteria are met:

    • There are fewer than four FC initiator ports available to connect the disk storage and no additional ports can be configured as FC initiators.

    • All slots are in use and no FC initiator card can be added.

Cisco switch license requirements

Certain feature-based licenses might be required for the Cisco switches in a fabric-attached MetroCluster configuration. These licenses enable you to use features such as QoS or long-distance mode credits on the switches. You must install the required feature-based licenses on all four switches in a MetroCluster configuration.

The following feature-based licenses might be required in a MetroCluster configuration:

  • ENTERPRISE_PKG

    This license enables you to use the QoS feature on Cisco switches.

  • PORT_ACTIVATION_PKG

    You can use this license for Cisco 9148 switches. This license enables you to activate or deactivate ports on the switches as long as only 16 ports are active at any given time. By default, 16 ports are enabled in Cisco MDS 9148 switches.

  • FM_SERVER_PKG

    This license enables you to manage fabrics simultaneously and to manage switches through a web browser.

    The FM_SERVER_PKG license also enables performance management features such as performance thresholds and threshold monitoring. For more information about this license, see the Cisco Fabric Manager Server Package.

You can verify that the licenses are installed by using the show license usage command. If you do not have these licenses, contact your sales representative before proceeding with the installation.

Note The Cisco MDS 9250i switches have two fixed 1/10 GbE IP storage services ports. No additional licenses are required for these ports. The Cisco SAN Extension over IP application package is a standard license on these switches that enables features such as FCIP and compression.

Setting the Cisco FC switch to factory defaults

To ensure a successful configuration, you must set the switch to its factory defaults. This ensures that the switch is starting from a clean configuration.

About this task

This task must be performed on all switches in the MetroCluster configuration.

Steps
  1. Make a console connection and log in to both switches in the same fabric.

  2. Set the switch back to its default settings:

    write erase

    You can respond “y” when prompted to confirm the command. This erases all licenses and configuration information on the switch.

  3. Reboot the switch:

    reload

    You can respond “y” when prompted to confirm the command.

  4. Repeat the write erase and reload commands on the other switch.

    After issuing the reload command, the switch reboots and then prompts with setup questions. At that point, proceed to the next section.

Example

The following example shows the process on a fabric consisting of FC_switch_A_1 and FC_switch_B_1.

FC_Switch_A_1# write erase
    Warning: This command will erase the startup-configuration.
    Do you wish to proceed anyway? (y/n)  [n] y
    FC_Switch_A_1# reload
    This command will reboot the system. (y/n)?  [n] y

FC_Switch_B_1# write erase
    Warning: This command will erase the startup-configuration.
    Do you wish to proceed anyway? (y/n)  [n] y
    FC_Switch_B_1# reload
    This command will reboot the system. (y/n)?  [n] y

Configure the Cisco FC switch basic settings and community string

You must specify the basic settings with the setup command or after issuing the reload command.

Steps
  1. If the switch does not display the setup questions, configure the basic switch settings:

    setup

  2. Accept the default responses to the setup questions until you are prompted for the SNMP community string.

  3. Set the community string to “public” (all lowercase) to allow access from the ONTAP Health Monitors.

    You can set the community string to a value other than “public”, but you must configure the ONTAP Health Monitors using the community string you specify.

    The following example shows the commands on FC_switch_A_1:

    FC_switch_A_1# setup
        Configure read-only SNMP community string (yes/no) [n]: y
        SNMP community string : public
        Note:  Please set the SNMP community string to "Public" or another value of your choosing.
        Configure default switchport interface state (shut/noshut) [shut]: noshut
        Configure default switchport port mode F (yes/no) [n]: n
        Configure default zone policy (permit/deny) [deny]: deny
        Enable full zoneset distribution? (yes/no) [n]: yes

    The following example shows the commands on FC_switch_B_1:

    FC_switch_B_1# setup
        Configure read-only SNMP community string (yes/no) [n]: y
        SNMP community string : public
        Note:  Please set the SNMP community string to "Public" or another value of your choosing.
        Configure default switchport interface state (shut/noshut) [shut]: noshut
        Configure default switchport port mode F (yes/no) [n]: n
        Configure default zone policy (permit/deny) [deny]: deny
        Enable full zoneset distribution? (yes/no) [n]: yes

Acquiring licenses for ports

You do not have to use Cisco switch licenses on a continuous range of ports; instead, you can acquire licenses for specific ports that are used and remove licenses from unused ports.

Before you begin

You should verify the number of licensed ports in the switch configuration and, if necessary, move licenses from one port to another as needed.

Steps
  1. Display the license usage for a switch fabric:

    show port-resources module 1

    Determine which ports require licenses. If some of those ports are unlicensed, determine if you have extra licensed ports and consider removing the licenses from them.

  2. Enter configuration mode:

    config t

  3. Remove the license from the selected port:

    1. Select the port to be unlicensed:

      interface interface-name

    2. Remove the license from the port:

      no port-license acquire

    3. Exit the port configuration interface:

      exit

  4. Acquire the license for the selected port:

    1. Select the port to be unlicensed:

      interface interface-name

    2. Make the port eligible to acquire a license:

      port-license

    3. Acquire the license on the port:

      port-license acquire

    4. Exit the port configuration interface:

      exit

  5. Repeat for any additional ports.

  6. Exit configuration mode:

    exit

Removing and acquiring a license on a port

This example shows a license being removed from port fc1/2, port fc1/1 being made eligible to acquire a license, and the license being acquired on port fc1/1:

Switch_A_1# conf t
    Switch_A_1(config)# interface fc1/2
    Switch_A_1(config)# shut
    Switch_A_1(config-if)# no port-license acquire
    Switch_A_1(config-if)# exit
    Switch_A_1(config)# interface fc1/1
    Switch_A_1(config-if)# port-license
    Switch_A_1(config-if)# port-license acquire
    Switch_A_1(config-if)# no shut
    Switch_A_1(config-if)# end
    Switch_A_1# copy running-config startup-config

    Switch_B_1# conf t
    Switch_B_1(config)# interface fc1/2
    Switch_B_1(config)# shut
    Switch_B_1(config-if)# no port-license acquire
    Switch_B_1(config-if)# exit
    Switch_B_1(config)# interface fc1/1
    Switch_B_1(config-if)# port-license
    Switch_B_1(config-if)# port-license acquire
    Switch_B_1(config-if)# no shut
    Switch_B_1(config-if)# end
    Switch_B_1# copy running-config startup-config

The following example shows port license usage being verified:

Switch_A_1# show port-resources module 1
    Switch_B_1# show port-resources module 1

Enabling ports in a Cisco MDS 9148 or 9148S switch

In Cisco MDS 9148 or 9148S switches, you must manually enable the ports required in a MetroCluster configuration.

About this task
  • You can manually enable 16 ports in a Cisco MDS 9148 or 9148S switch.

  • The Cisco switches enable you to apply the POD license on random ports, as opposed to applying them in sequence.

  • Cisco switches require that you use one port from each port group, unless you need more than 12 ports.

Steps
  1. View the port groups available in a Cisco switch:

    show port-resources module blade_number

  2. License and acquire the required port in a port group:

    config t

    interface port_number

    shut

    port-license acquire

    no shut

    For example, the following command sequence licenses and acquires Port fc 1/45:

    switch# config t
    switch(config)#
    switch(config)# interface fc 1/45
    switch(config-if)#
    switch(config-if)# shut
    switch(config-if)# port-license acquire
    switch(config-if)# no shut
    switch(config-if)# end
  3. Save the configuration:

    copy running-config startup-config

Configuring the F-ports on a Cisco FC switch

You must configure the F-ports on the FC switch.

About this task

In a MetroCluster configuration, the F-ports are the ports that connect the switch to the HBA initiators, FC-VI interconnects and FC-to-SAS bridges.

Each port must be configured individually.

Refer to the following sections to identify the F-ports (switch-to-node) for your configuration:

This task must be performed on each switch in the MetroCluster configuration.

Steps
  1. Enter configuration mode:

    config t

  2. Enter interface configuration mode for the port:

    interface port-ID

  3. Shut down the port:

    shutdown

  4. Set the ports to F mode:

    switchport mode F

  5. Set the ports to fixed speed:

    switchport speed speed-value

    speed-value is either 8000 or 16000

  6. Set the rate mode of the switch port to dedicated:

    switchport rate-mode dedicated

  7. Restart the port:

    no shutdown

  8. Exit configuration mode:

    end

Example

The following example shows the commands on the two switches:

Switch_A_1# config  t
FC_switch_A_1(config)# interface fc 1/1
FC_switch_A_1(config-if)# shutdown
FC_switch_A_1(config-if)# switchport mode F
FC_switch_A_1(config-if)# switchport speed 8000
FC_switch_A_1(config-if)# switchport rate-mode dedicated
FC_switch_A_1(config-if)# no shutdown
FC_switch_A_1(config-if)# end
FC_switch_A_1# copy running-config startup-config

FC_switch_B_1# config  t
FC_switch_B_1(config)# interface fc 1/1
FC_switch_B_1(config-if)# switchport mode F
FC_switch_B_1(config-if)# switchport speed 8000
FC_switch_B_1(config-if)# switchport rate-mode dedicated
FC_switch_B_1(config-if)# no shutdown
FC_switch_B_1(config-if)# end
FC_switch_B_1# copy running-config startup-config

Assigning buffer-to-buffer credits to F-Ports in the same port group as the ISL

You must assign the buffer-to-buffer credits to the F-ports if they are in the same port group as the ISL. If the ports do not have the required buffer-to-buffer credits, the ISL could be inoperative.

About this task

This task is not required if the F-ports are not in the same port group as the ISL port.

If the F-Ports are in a port group that contains the ISL, this task must be performed on each FC switch in the MetroCluster configuration.

Steps
  1. Enter configuration mode:

    config t

  2. Set the interface configuration mode for the port:

    interface port-ID

  3. Disable the port:

    shut

  4. If the port is not already in F mode, set the port to F mode:

    switchport mode F

  5. Set the buffer-to-buffer credit of the non-E ports to 1:

    switchport fcrxbbcredit 1

  6. Re-enable the port:

    no shut

  7. Exit configuration mode:

    exit

  8. Copy the updated configuration to the startup configuration:

    copy running-config startup-config

  9. Verify the buffer-to-buffer credit assigned to a port:

    show port-resources module 1

  10. Exit configuration mode:

    exit

  11. Repeat these steps on the other switch in the fabric.

  12. Verify the settings:

    show port-resource module 1

Example

In this example, port fc1/40 is the ISL. Ports fc1/37, fc1/38 and fc1/39 are in the same port group and must be configured.

The following commands show the port range being configured for fc1/37 through fc1/39:

FC_switch_A_1# conf t
FC_switch_A_1(config)# interface fc1/37-39
FC_switch_A_1(config-if)# shut
FC_switch_A_1(config-if)# switchport mode F
FC_switch_A_1(config-if)# switchport fcrxbbcredit 1
FC_switch_A_1(config-if)# no shut
FC_switch_A_1(config-if)# exit
FC_switch_A_1# copy running-config startup-config

FC_switch_B_1# conf t
FC_switch_B_1(config)# interface fc1/37-39
FC_switch_B_1(config-if)# shut
FC_switch_B_1(config-if)# switchport mode F
FC_switch_B_1(config-if)# switchport fcrxbbcredit 1
FC_switch_A_1(config-if)# no shut
FC_switch_A_1(config-if)# exit
FC_switch_B_1# copy running-config startup-config

The following commands and system output show that the settings are properly applied:

FC_switch_A_1# show port-resource module 1
...
Port-Group 11
 Available dedicated buffers are 93

--------------------------------------------------------------------
Interfaces in the Port-Group       B2B Credit  Bandwidth  Rate Mode
                                      Buffers     (Gbps)

--------------------------------------------------------------------
fc1/37                                     32        8.0  dedicated
fc1/38                                      1        8.0  dedicated
fc1/39                                      1        8.0  dedicated
...

FC_switch_B_1# port-resource module
...
Port-Group 11
 Available dedicated buffers are 93

--------------------------------------------------------------------
Interfaces in the Port-Group       B2B Credit  Bandwidth  Rate Mode
                                     Buffers     (Gbps)

--------------------------------------------------------------------
fc1/37                                     32        8.0  dedicated
fc1/38                                      1        8.0  dedicated
fc1/39                                      1        8.0 dedicated
...

Creating and configuring VSANs on Cisco FC switches

You must create a VSAN for the FC-VI ports and a VSAN for the storage ports on each FC switch in the MetroCluster configuration.

About this task

The VSANs should have a unique number and name. You must do additional configuration if you are using two ISLs with in-order delivery of frames.

The examples of this task use the following naming conventions:

Switch fabric

VSAN name

ID number

1

FCVI_1_10

10

STOR_1_20

20

2

FCVI_2_30

30

STOR_2_20

40

This task must be performed on each FC switch fabric.

Steps
  1. Configure the FC-VI VSAN:

    1. Enter configuration mode if you have not done so already:

      config t

    2. Edit the VSAN database:

      vsan database

    3. Set the VSAN ID:

      vsan vsan-ID

    4. Set the VSAN name:

      vsan vsan-ID name vsan_name

  2. Add ports to the FC-VI VSAN:

    1. Add the interfaces for each port in the VSAN:

      vsan vsan-ID interface interface_name

      For the FC-VI VSAN, the ports connecting the local FC-VI ports will be added.

    2. Exit configuration mode:

      end

    3. Copy the running-config to the startup-config:

      copy running-config startup-config

      In the following example, the ports are fc1/1 and fc1/13:

      FC_switch_A_1# conf t
      FC_switch_A_1(config)# vsan database
      FC_switch_A_1(config)# vsan 10 interface fc1/1
      FC_switch_A_1(config)# vsan 10 interface fc1/13
      FC_switch_A_1(config)# end
      FC_switch_A_1# copy running-config startup-config
      FC_switch_B_1# conf t
      FC_switch_B_1(config)# vsan database
      FC_switch_B_1(config)# vsan 10 interface fc1/1
      FC_switch_B_1(config)# vsan 10 interface fc1/13
      FC_switch_B_1(config)# end
      FC_switch_B_1# copy running-config startup-config
  3. Verify port membership of the VSAN:

    show vsan member

    FC_switch_A_1# show vsan member
    FC_switch_B_1# show vsan member
  4. Configure the VSAN to guarantee in-order delivery of frames or out-of-order delivery of frames:

    Note The standard IOD settings are recommended. You should configure OOD only if necessary.
    • The following steps must be performed to configure in-order delivery of frames:

      1. Enter configuration mode:

        conf t

      2. Enable the in-order guarantee of exchanges for the VSAN:

        in-order-guarantee vsan vsan-ID

        Important For FC-VI VSANs (FCVI_1_10 and FCVI_2_30), you must enable in-order guarantee of frames and exchanges only on VSAN 10.
      3. Enable load balancing for the VSAN:

        vsan vsan-ID loadbalancing src-dst-id

      4. Exit configuration mode:

        end

      5. Copy the running-config to the startup-config:

        copy running-config startup-config

        The commands to configure in-order delivery of frames on FC_switch_A_1:

        FC_switch_A_1# config t
        FC_switch_A_1(config)# in-order-guarantee vsan 10
        FC_switch_A_1(config)# vsan database
        FC_switch_A_1(config-vsan-db)# vsan 10 loadbalancing src-dst-id
        FC_switch_A_1(config-vsan-db)# end
        FC_switch_A_1# copy running-config startup-config

        The commands to configure in-order delivery of frames on FC_switch_B_1:

        FC_switch_B_1# config t
        FC_switch_B_1(config)# in-order-guarantee vsan 10
        FC_switch_B_1(config)# vsan database
        FC_switch_B_1(config-vsan-db)# vsan 10 loadbalancing src-dst-id
        FC_switch_B_1(config-vsan-db)# end
        FC_switch_B_1# copy running-config startup-config
    • The following steps must be performed to configure out-of-order delivery of frames:

      1. Enter configuration mode:

        conf t

      2. Disable the in-order guarantee of exchanges for the VSAN:

        no in-order-guarantee vsan vsan-ID

      3. Enable load balancing for the VSAN:

        vsan vsan-ID loadbalancing src-dst-id

      4. Exit configuration mode:

        end

      5. Copy the running-config to the startup-config:

        copy running-config startup-config

        The commands to configure out-of-order delivery of frames on FC_switch_A_1:

        FC_switch_A_1# config t
        FC_switch_A_1(config)# no in-order-guarantee vsan 10
        FC_switch_A_1(config)# vsan database
        FC_switch_A_1(config-vsan-db)# vsan 10 loadbalancing src-dst-id
        FC_switch_A_1(config-vsan-db)# end
        FC_switch_A_1# copy running-config startup-config

        The commands to configure out-of-order delivery of frames on FC_switch_B_1:

        FC_switch_B_1# config t
        FC_switch_B_1(config)# no in-order-guarantee vsan 10
        FC_switch_B_1(config)# vsan database
        FC_switch_B_1(config-vsan-db)# vsan 10 loadbalancing src-dst-id
        FC_switch_B_1(config-vsan-db)# end
        FC_switch_B_1# copy running-config startup-config
        Note When configuring ONTAP on the controller modules, OOD must be explicitly configured on each controller module in the MetroCluster configuration.
  5. Set QoS policies for the FC-VI VSAN:

    1. Enter configuration mode:

      conf t

    2. Enable the QoS and create a class map by entering the following commands in sequence:

      qos enable

      qos class-map class_name match-any

    3. Add the class map created in a previous step to the policy map:

      class class_name

    4. Set the priority:

      priority high

    5. Add the VSAN to the policy map created previously in this procedure:

      qos service policy policy_name vsan vsan-id

    6. Copy the updated configuration to the startup configuration:

      copy running-config startup-config

    The commands to set the QoS policies on FC_switch_A_1:

    FC_switch_A_1# conf t
    FC_switch_A_1(config)# qos enable
    FC_switch_A_1(config)# qos class-map FCVI_1_10_Class match-any
    FC_switch_A_1(config)# qos policy-map FCVI_1_10_Policy
    FC_switch_A_1(config-pmap)# class FCVI_1_10_Class
    FC_switch_A_1(config-pmap-c)# priority high
    FC_switch_A_1(config-pmap-c)# exit
    FC_switch_A_1(config)# exit
    FC_switch_A_1(config)# qos service policy FCVI_1_10_Policy vsan 10
    FC_switch_A_1(config)# end
    FC_switch_A_1# copy running-config startup-config

    The commands to set the QoS policies on FC_switch_B_1:

    FC_switch_B_1# conf t
    FC_switch_B_1(config)# qos enable
    FC_switch_B_1(config)# qos class-map FCVI_1_10_Class match-any
    FC_switch_B_1(config)# qos policy-map FCVI_1_10_Policy
    FC_switch_B_1(config-pmap)# class FCVI_1_10_Class
    FC_switch_B_1(config-pmap-c)# priority high
    FC_switch_B_1(config-pmap-c)# exit
    FC_switch_B_1(config)# exit
    FC_switch_B_1(config)# qos service policy FCVI_1_10_Policy vsan 10
    FC_switch_B_1(config)# end
    FC_switch_B_1# copy running-config startup-config
  6. Configure the storage VSAN:

    1. Set the VSAN ID:

      vsan vsan-ID

    2. Set the VSAN name:

      vsan vsan-ID name vsan_name

    The commands to configure the storage VSAN on FC_switch_A_1:

    FC_switch_A_1# conf t
    FC_switch_A_1(config)# vsan database
    FC_switch_A_1(config-vsan-db)# vsan 20
    FC_switch_A_1(config-vsan-db)# vsan 20 name STOR_1_20
    FC_switch_A_1(config-vsan-db)# end
    FC_switch_A_1# copy running-config startup-config

    The commands to configure the storage VSAN on FC_switch_B_1:

    FC_switch_B_1# conf t
    FC_switch_B_1(config)# vsan database
    FC_switch_B_1(config-vsan-db)# vsan 20
    FC_switch_B_1(config-vsan-db)# vsan 20 name STOR_1_20
    FC_switch_B_1(config-vsan-db)# end
    FC_switch_B_1# copy running-config startup-config
  7. Add ports to the storage VSAN.

    For the storage VSAN, all ports connecting HBA or FC-to-SAS bridges must be added. In this example fc1/5, fc1/9, fc1/17, fc1/21. fc1/25, fc1/29, fc1/33, and fc1/37 are being added.

    The commands to add ports to the storage VSAN on FC_switch_A_1:

    FC_switch_A_1# conf t
    FC_switch_A_1(config)# vsan database
    FC_switch_A_1(config)# vsan 20 interface fc1/5
    FC_switch_A_1(config)# vsan 20 interface fc1/9
    FC_switch_A_1(config)# vsan 20 interface fc1/17
    FC_switch_A_1(config)# vsan 20 interface fc1/21
    FC_switch_A_1(config)# vsan 20 interface fc1/25
    FC_switch_A_1(config)# vsan 20 interface fc1/29
    FC_switch_A_1(config)# vsan 20 interface fc1/33
    FC_switch_A_1(config)# vsan 20 interface fc1/37
    FC_switch_A_1(config)# end
    FC_switch_A_1# copy running-config startup-config

    The commands to add ports to the storage VSAN on FC_switch_B_1:

    FC_switch_B_1# conf t
    FC_switch_B_1(config)# vsan database
    FC_switch_B_1(config)# vsan 20 interface fc1/5
    FC_switch_B_1(config)# vsan 20 interface fc1/9
    FC_switch_B_1(config)# vsan 20 interface fc1/17
    FC_switch_B_1(config)# vsan 20 interface fc1/21
    FC_switch_B_1(config)# vsan 20 interface fc1/25
    FC_switch_B_1(config)# vsan 20 interface fc1/29
    FC_switch_B_1(config)# vsan 20 interface fc1/33
    FC_switch_B_1(config)# vsan 20 interface fc1/37
    FC_switch_B_1(config)# end
    FC_switch_B_1# copy running-config startup-config

Configuring E-ports

You must configure the switch ports that connect the ISL (these are the E-Ports).

About this task

The procedure you use depends on which switch you are using:

Configuring the E-ports on the Cisco FC switch

You must configure the FC switch ports that connect the inter-switch link (ISL).

About this task

These are the E-ports, and configuration must be done for each port. To do so, you must calculate the correct number of buffer-to-buffer credits (BBCs).

All ISLs in the fabric must be configured with the same speed and distance settings.

This task must be performed on each ISL port.

Steps
  1. Use the following table to determine the adjusted required BBCs per kilometer for possible port speeds.

    To determine the correct number of BBCs, you multiply the Adjusted BBCs required (determined from the following table) by the distance in kilometers between the switches. An adjustment factor of 1.5 is required to account for FC-VI framing behavior.

    Speed in Gbps

    BBCs required per kilometer

    Adjusted BBCs required (BBCs per km x 1.5)

    1

    0.5

    0.75

    2

    1

    1.5

    4

    2

    3

    8

    4

    6

    16

    8

    12

For example, to compute the required number of credits for a distance of 30 km on a 4-Gbps link, make the following calculation:

  • Speed in Gbps is 4

  • Adjusted BBCs required is 3

  • Distance in kilometers between switches is 30 km

  • 3 x 30 = 90

    1. Enter configuration mode:

      config t

    2. Specify the port you are configuring:

      interface port-name

    3. Shut down the port:

      shutdown

    4. Set the rate mode of the port to "dedicated":

      switchport rate-mode dedicated

    5. Set the speed for the port:

      switchport speed speed-value

    6. Set the buffer-to-buffer credits for the port:

      switchport fcrxbbcredit number_of_buffers

    7. Set the port to E mode:

      switchport mode E

    8. Enable the trunk mode for the port:

      switchport trunk mode on

    9. Add the ISL virtual storage area networks (VSANs) to the trunk:

      switchport trunk allowed vsan 10

      switchport trunk allowed vsan add 20

    10. Add the port to port channel 1:

      channel-group 1

    11. Repeat the previous steps for the matching ISL port on the partner switch in the fabric.

      The following example shows port fc1/41 configured for a distance of 30 km and 8 Gbps:

      FC_switch_A_1# conf t
      FC_switch_A_1# shutdown
      FC_switch_A_1# switchport rate-mode dedicated
      FC_switch_A_1# switchport speed 8000
      FC_switch_A_1# switchport fcrxbbcredit 60
      FC_switch_A_1# switchport mode E
      FC_switch_A_1# switchport trunk mode on
      FC_switch_A_1# switchport trunk allowed vsan 10
      FC_switch_A_1# switchport trunk allowed vsan add 20
      FC_switch_A_1# channel-group 1
      fc1/36 added to port-channel 1 and disabled
      
      FC_switch_B_1# conf t
      FC_switch_B_1# shutdown
      FC_switch_B_1# switchport rate-mode dedicated
      FC_switch_B_1# switchport speed 8000
      FC_switch_B_1# switchport fcrxbbcredit 60
      FC_switch_B_1# switchport mode E
      FC_switch_B_1# switchport trunk mode on
      FC_switch_B_1# switchport trunk allowed vsan 10
      FC_switch_B_1# switchport trunk allowed vsan add 20
      FC_switch_B_1# channel-group 1
      fc1/36 added to port-channel 1 and disabled
    12. Issue the following command on both switches to restart the ports:

      no shutdown

    13. Repeat the previous steps for the other ISL ports in the fabric.

    14. Add the native VSAN to the port-channel interface on both switches in the same fabric:

      interface port-channel number

      switchport trunk allowed vsan add native_san_id

    15. Verify configuration of the port-channel:

      show interface port-channel number

      The port channel should have the following attributes:

  • The port-channel is "trunking".

  • Admin port mode is E, trunk mode is on.

  • Speed shows the cumulative value of all the ISL link speeds.

    For example, two ISL ports operating at 4 Gbps should show a speed of 8 Gbps.

  • Trunk vsans (admin allowed and active) shows all the allowed VSANs.

  • Trunk vsans (up) shows all the allowed VSANs.

  • The member list shows all the ISL ports that were added to the port-channel.

  • The port VSAN number should be the same as the VSAN that contains the ISLs (usually native vsan 1).

    FC_switch_A_1(config-if)# show int port-channel 1
    port-channel 1 is trunking
        Hardware is Fibre Channel
        Port WWN is 24:01:54:7f:ee:e2:8d:a0
        Admin port mode is E, trunk mode is on
        snmp link state traps are enabled
        Port mode is TE
        Port vsan is 1
        Speed is 8 Gbps
        Trunk vsans (admin allowed and active) (1,10,20)
        Trunk vsans (up)                       (1,10,20)
        Trunk vsans (isolated)                 ()
        Trunk vsans (initializing)             ()
        5 minutes input rate 1154832 bits/sec,144354 bytes/sec, 170 frames/sec
        5 minutes output rate 1299152 bits/sec,162394 bytes/sec, 183 frames/sec
          535724861 frames input,1069616011292 bytes
            0 discards,0 errors
            0 invalid CRC/FCS,0 unknown class
            0 too long,0 too short
          572290295 frames output,1144869385204 bytes
            0 discards,0 errors
          5 input OLS,11  LRR,2 NOS,0 loop inits
          14 output OLS,5 LRR, 0 NOS, 0 loop inits
        Member[1] : fc1/36
        Member[2] : fc1/40
        Interface last changed at Thu Oct 16 11:48:00 2014
    1. Exit interface configuration on both switches:

      end

    2. Copy the updated configuration to the startup configuration on both fabrics:

      copy running-config startup-config

      FC_switch_A_1(config-if)# end
      FC_switch_A_1# copy running-config startup-config
      
      FC_switch_B_1(config-if)# end
      FC_switch_B_1# copy running-config startup-config
    3. Repeat the previous steps on the second switch fabric.

Related information

You need to verify that you are using the specified port assignments when you cable the FC switches when using ONTAP 9.1 and later. Refer to Port assignments for FC switches when using ONTAP 9.1 and later

Configuring FCIP ports for a single ISL on Cisco 9250i FC switches

You must configure the FCIP switch ports that connect the ISL (E-ports) by creating FCIP profiles and interfaces, and then assigning them to the IPStorage1/1 GbE interface.

About this task

This task is only for configurations using a single ISL per switch fabric, using the IPStorage1/1 interface on each switch.

This task must be performed on each FC switch.

Two FCIP profiles are created on each switch:

  • Fabric 1

    • FC_switch_A_1 is configured with FCIP profiles 11 and 111.

    • FC_switch_B_1 is configured with FCIP profiles 12 and 121.

  • Fabric 2

    • FC_switch_A_2 is configured with FCIP profiles 13 and 131.

    • FC_switch_B_2 is configured with FCIP profiles 14 and 141.

Steps
  1. Enter configuration mode:

    config t

  2. Enable FCIP:

    feature fcip

  3. Configure the IPStorage1/1 GbE interface:

    1. Enter configuration mode:

      conf t

    2. Specify the IPStorage1/1 interface:

      interface IPStorage1/1

    3. Specify the IP address and subnet mask:

      interface ip-address subnet-mask

    4. Specify the MTU size of 2500:

      switchport mtu 2500

    5. Enable the port:

      no shutdown

    6. Exit configuration mode:

      exit

    The following example shows the configuration of an IPStorage1/1 port:

    conf t
    interface IPStorage1/1
      ip address 192.168.1.201 255.255.255.0
      switchport mtu 2500
      no shutdown
    exit
  4. Configure the FCIP profile for FC-VI traffic:

    1. Configure an FCIP profile and enter FCIP profile configuration mode:

      fcip profile FCIP-profile-name

      The profile name depends on which switch is being configured.

    2. Assign the IP address of the IPStorage1/1 interface to the FCIP profile:

      ip address ip-address

    3. Assign the FCIP profile to TCP port 3227:

      port 3227

    4. Set the TCP settings:

      tcp keepalive-timeout 1

      tcp max-retransmissions 3

      max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3

      tcp min-retransmit-time 200

      tcp keepalive-timeout 1

      tcp pmtu-enable reset-timeout 3600

      tcp sack-enable``no tcp cwm

    The following example shows the configuration of the FCIP profile:

    conf t
    fcip profile 11
      ip address 192.168.1.333
      port 3227
      tcp keepalive-timeout 1
    tcp max-retransmissions 3
    max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
      tcp min-retransmit-time 200
      tcp keepalive-timeout 1
      tcp pmtu-enable reset-timeout 3600
      tcp sack-enable
      no tcp cwm
  5. Configure the FCIP profile for storage traffic:

    1. Configure an FCIP profile with the name 111 and enter FCIP profile configuration mode:

      fcip profile 111

    2. Assign the IP address of the IPStorage1/1 interface to the FCIP profile:

      ip address ip-address

    3. Assign the FCIP profile to TCP port 3229:

      port 3229

    4. Set the TCP settings:

      tcp keepalive-timeout 1

      tcp max-retransmissions 3

      max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3

      tcp min-retransmit-time 200

      tcp keepalive-timeout 1

      tcp pmtu-enable reset-timeout 3600

      tcp sack-enable``no tcp cwm

    The following example shows the configuration of the FCIP profile:

    conf t
    fcip profile 111
      ip address 192.168.1.334
      port 3229
      tcp keepalive-timeout 1
    tcp max-retransmissions 3
    max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
      tcp min-retransmit-time 200
      tcp keepalive-timeout 1
      tcp pmtu-enable reset-timeout 3600
      tcp sack-enable
      no tcp cwm
  6. Create the first of two FCIP interfaces:

    interface fcip 1

    This interface is used for FC-IV traffic.

    1. Select the profile 11 created previously:

      use-profile 11

    2. Set the IP address and port of the IPStorage1/1 port on the partner switch:

      peer-info ipaddr partner-switch-port-ip port 3227

    3. Select TCP connection 2:

      tcp-connection 2

    4. Disable compression:

      no ip-compression

    5. Enable the interface:

      no shutdown

    6. Configure the control TCP connection to 48 and the data connection to 26 to mark all packets on that differentiated services code point (DSCP) value:

      qos control 48 data 26

    7. Exit the interface configuration mode:

      exit

    The following example shows the configuration of the FCIP interface:

    interface fcip  1
      use-profile 11
    # the port # listed in this command is the port that the remote switch is listening on
     peer-info ipaddr 192.168.32.334   port 3227
      tcp-connection 2
      no ip-compression
      no shutdown
      qos control 48 data 26
    exit
  7. Create the second of two FCIP interfaces:

    interface fcip 2

    This interface is used for storage traffic.

    1. Select the profile 111 created previously:

      use-profile 111

    2. Set the IP address and port of the IPStorage1/1 port on the partner switch:

      peer-info ipaddr partner-switch-port-ip port 3229

    3. Select TCP connection 2:

      tcp-connection 5

    4. Disable compression:

      no ip-compression

    5. Enable the interface:

      no shutdown

    6. Configure the control TCP connection to 48 and data connection to 26 to mark all packets on that differentiated services code point (DSCP) value:

      qos control 48 data 26

    7. Exit the interface configuration mode:

      exit

    The following example shows the configuration of the FCIP interface:

    interface fcip  2
      use-profile 11
    # the port # listed in this command is the port that the remote switch is listening on
     peer-info ipaddr 192.168.32.33e  port 3229
      tcp-connection 5
      no ip-compression
      no shutdown
      qos control 48 data 26
    exit
  8. Configure the switchport settings on the fcip 1 interface:

    1. Enter configuration mode:

      config t

    2. Specify the port you are configuring:

      interface fcip 1

    3. Shut down the port:

      shutdown

    4. Set the port to E mode:

      switchport mode E

    5. Enable the trunk mode for the port:

      switchport trunk mode on

    6. Set the trunk allowed vsan to 10:

      switchport trunk allowed vsan 10

    7. Set the speed for the port:

      switchport speed speed-value

  9. Configure the switchport settings on the fcip 2 interface:

    1. Enter configuration mode:

      config t

    2. Specify the port you are configuring:

      interface fcip 2

    3. Shut down the port:

      shutdown

    4. Set the port to E mode:

      switchport mode E

    5. Enable the trunk mode for the port:

      switchport trunk mode on

    6. Set the trunk allowed vsan to 20:

      switchport trunk allowed vsan 20

    7. Set the speed for the port:

      switchport speed speed-value

  10. Repeat the previous steps on the second switch.

    The only differences are the appropriate IP addresses and unique FCIP profile names.

    • When configuring the first switch fabric, FC_switch_B_1 is configured with FCIP profiles 12 and 121.

    • When configuring the first switch fabric, FC_switch_A_2 is configured with FCIP profiles 13 and 131 and FC_switch_B_2 is configured with FCIP profiles 14 and 141.

  11. Restart the ports on both switches:

    no shutdown

  12. Exit the interface configuration on both switches:

    end

  13. Copy the updated configuration to the startup configuration on both switches:

    copy running-config startup-config

    FC_switch_A_1(config-if)# end
    FC_switch_A_1# copy running-config startup-config
    
    FC_switch_B_1(config-if)# end
    FC_switch_B_1# copy running-config startup-config
  14. Repeat the previous steps on the second switch fabric.

Configuring FCIP ports for a dual ISL on Cisco 9250i FC switches

You must configure the FCIP switch ports that connect the ISL (E-ports) by creating FCIP profiles and interfaces, and then assigning them to the IPStorage1/1 and IPStorage1/2 GbE interfaces.

About this task

This task is only for configurations that use a dual ISL per switch fabric, using the IPStorage1/1 and IPStorage1/2 GbE interfaces on each switch.

This task must be performed on each FC switch.

fcip ports dual isl

The task and examples use the following profile configuration tables:

Fabric 1 profile configuration table

Switch fabric

IPStorage interface

IP Address

Port type

FCIP interface

FCIP profile

Port

Peer IP/port

VSAN ID

FC_switch_A_1

IPStorage1/1

a.a.a.a

FC-VI

fcip 1

15

3220

c.c.c.c/3230

10

Storage

fcip 2

20

3221

c.c.c.c/3231

20

IPStorage1/2

b.b.b.b

FC-VI

fcip 3

25

3222

d.d.d.d/3232

10

Storage

fcip 4

30

3223

d.d.d.d/3233

20

FC_switch_B_1

IPStorage1/1

c.c.c.c

FC-VI

fcip 1

15

3230

a.a.a.a/3220

10

Storage

fcip 2

20

3231

a.a.a.a/3221

20

IPStorage1/2

d.d.d.d

FC-VI

fcip 3

25

3232

b.b.b.b/3222

10

Storage

fcip 4

30

3233

b.b.b.b/3223

20

Fabric 2 profile configuration table

Switch fabric

IPStorage interface

IP Address

Port type

FCIP interface

FCIP profile

Port

Peer IP/port

VSAN ID

FC_switch_A_2

IPStorage1/1

e.e.e.e

FC-VI

fcip 1

15

3220

g.g.g.g/3230

10

Storage

fcip 2

20

3221

g.g.g.g/3231

20

IPStorage1/2

f.f.f.f

FC-VI

fcip 3

25

3222

h.h.h.h/3232

10

Storage

fcip 4

30

3223

h.h.h.h/3233

20

FC_switch_B_2

IPStorage1/1

g.g.g.g

FC-VI

fcip 1

15

3230

e.e.e.e/3220

10

Storage

fcip 2

20

3231

e.e.e.e/3221

20

IPStorage1/2

h.h.h.h

FC-VI

fcip 3

25

3232

f.f.f.f/3222

10

Storage

fcip 4

30

3233

f.f.f.f/3223

20

Steps
  1. Enter configuration mode:

    config t

  2. Enable FCIP:

    feature fcip

  3. On each switch, configure the two IPStorage interfaces (“IPStorage1/1” and “IPStorage1/2”):

    1. Enter configuration mode:

      conf t

    2. Specify the IPStorage interface to create:

      interface ipstorage

      The ipstorage parameter value is “IPStorage1/1” or “IPStorage1/2”.

    3. Specify the IP address and subnet mask of the IPStorage interface previously specified:

      interface ip-address subnet-mask

      Note On each switch, the IPStorage interfaces “IPStorage1/1” and “IPStorage1/2” must have different IP addresses.
    4. Specify the MTU size as 2500:

      switchport mtu 2500

    5. Enable the port:

      no shutdown

    6. Exit configuration mode:

      exit

    7. Repeat Substep “a” through Substep “f” to configure the IPStorage1/2 GbE interface with a different IP address.

  4. Configure the FCIP profiles for FC-VI and storage traffic with the profile names given in the profile configuration table:

    1. Enter configuration mode:

      conf t

    2. Configure the FCIP profiles with the following profile names:

      fcip profile FCIP-profile-name

      The following list provides the values for the FCIP-profile-name parameter:

      • 15 for FC-VI on IPStorage1/1

      • 20 for storage on IPStorage1/1

      • 25 for FC-VI on IPStorage1/2

      • 30 for storage on IPStorage1/2

    3. Assign the FCIP profile ports according to the profile configuration table:

      port port_number

    4. Set the TCP settings:

      tcp keepalive-timeout 1

      tcp max-retransmissions 3

      max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3

      tcp min-retransmit-time 200

      tcp keepalive-timeout 1

      tcp pmtu-enable reset-timeout 3600

      tcp sack-enable

      no tcp cwm

  5. Create FCIP interfaces:

    interface fcip FCIP_interface

    The FCIP_interface parameter value is “1”, “2”, “3”, or “4” as shown in the profile configuration table.

    1. Map interfaces to the previously created profiles:

      use-profile profile

    2. Set the peer IP address and peer profile port number:

      peer-info peer IPstorage ipaddr port peer_profile_port_number

    3. Select the TCP connections:

      tcp-connection connection-#

      The connection-# parameter value is “2” for FC-VI profiles and “5” for storage profiles.

    4. Disable compression:

      no ip-compression

    5. Enable the interface:

      no shutdown

    6. Configure the control TCP connection to “48” and the data connection to “26” to mark all packets that have differentiated services code point (DSCP) value:

      qos control 48 data 26

    7. Exit configuration mode:

      exit

  6. Configure the switchport settings on each FCIP interface:

    1. Enter configuration mode:

      config t

    2. Specify the port that you are configuring:

      interface fcip 1

    3. Shut down the port:

      shutdown

    4. Set the port to E mode:

      switchport mode E

    5. Enable the trunk mode for the port:

      switchport trunk mode on

    6. Specify the trunk that is allowed on a specific VSAN:

      switchport trunk allowed vsan vsan_id

      The vsan_id parameter value is “VSAN 10” for FC-VI profiles and “VSAN 20” for storage profiles.

    7. Set the speed for the port:

      switchport speed speed-value

    8. Exit configuration mode:

      exit

  7. Copy the updated configuration to the startup configuration on both switches:

    copy running-config startup-config

The following examples show the configuration of FCIP ports for a dual ISL in fabric 1 switches FC_switch_A_1 and FC_switch_B_1.

For FC_switch_A_1:

FC_switch_A_1# config t
FC_switch_A_1(config)# no in-order-guarantee vsan 10
FC_switch_A_1(config-vsan-db)# end
FC_switch_A_1# copy running-config startup-config

# fcip settings

feature  fcip

conf t
interface IPStorage1/1
#  IP address:  a.a.a.a
#  Mask:  y.y.y.y
  ip address <a.a.a.a   y.y.y.y>
  switchport mtu 2500
  no shutdown
exit
conf t
fcip profile 15
  ip address <a.a.a.a>
  port 3220
  tcp keepalive-timeout 1
tcp max-retransmissions 3
max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
  tcp min-retransmit-time 200
  tcp keepalive-timeout 1
  tcp pmtu-enable reset-timeout 3600
  tcp sack-enable
  no tcp cwm

conf t
fcip profile 20
  ip address <a.a.a.a>
  port 3221
  tcp keepalive-timeout 1
tcp max-retransmissions 3
max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
  tcp min-retransmit-time 200
  tcp keepalive-timeout 1
  tcp pmtu-enable reset-timeout 3600
  tcp sack-enable
  no tcp cwm

conf t
interface IPStorage1/2
#  IP address:  b.b.b.b
#  Mask:  y.y.y.y
  ip address <b.b.b.b   y.y.y.y>
  switchport mtu 2500
  no shutdown
exit

conf t
fcip profile 25
  ip address <b.b.b.b>
  port 3222
tcp keepalive-timeout 1
tcp max-retransmissions 3
max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
  tcp min-retransmit-time 200
  tcp keepalive-timeout 1
  tcp pmtu-enable reset-timeout 3600
  tcp sack-enable
  no tcp cwm

conf t
fcip profile 30
  ip address <b.b.b.b>
  port 3223
tcp keepalive-timeout 1
tcp max-retransmissions 3
max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
  tcp min-retransmit-time 200
  tcp keepalive-timeout 1
  tcp pmtu-enable reset-timeout 3600
  tcp sack-enable
  no tcp cwm
interface fcip  1
  use-profile 15
# the port # listed in this command is the port that the remote switch is listening on
 peer-info ipaddr <c.c.c.c>  port 3230
  tcp-connection 2
  no ip-compression
  no shutdown
  qos control 48 data 26
exit

interface fcip  2
  use-profile 20
# the port # listed in this command is the port that the remote switch is listening on
 peer-info ipaddr <c.c.c.c>  port 3231
  tcp-connection 5
  no ip-compression
  no shutdown
  qos control 48 data 26
exit

interface fcip  3
  use-profile 25
# the port # listed in this command is the port that the remote switch is listening on
 peer-info ipaddr < d.d.d.d >  port 3232
  tcp-connection 2
  no ip-compression
  no shutdown
  qos control 48 data 26
exit

interface fcip  4
  use-profile 30
# the port # listed in this command is the port that the remote switch is listening on
 peer-info ipaddr < d.d.d.d >  port 3233
  tcp-connection 5
  no ip-compression
  no shutdown
  qos control 48 data 26
exit

conf t
interface fcip  1
shutdown
switchport mode E
switchport trunk mode on
switchport trunk allowed vsan 10
no shutdown
exit

conf t
interface fcip  2
shutdown
switchport mode E
switchport trunk mode on
switchport trunk allowed vsan 20
no shutdown
exit

conf t
interface fcip  3
shutdown
switchport mode E
switchport trunk mode on
switchport trunk allowed vsan 10
no shutdown
exit

conf t
interface fcip  4
shutdown
switchport mode E
switchport trunk mode on
switchport trunk allowed vsan 20
no shutdown
exit

For FC_switch_B_1:

FC_switch_A_1# config t
FC_switch_A_1(config)# in-order-guarantee vsan 10
FC_switch_A_1(config-vsan-db)# end
FC_switch_A_1# copy running-config startup-config

# fcip settings

feature  fcip

conf t
interface IPStorage1/1
#  IP address:  c.c.c.c
#  Mask:  y.y.y.y
  ip address <c.c.c.c   y.y.y.y>
  switchport mtu 2500
  no shutdown
exit

conf t
fcip profile 15
  ip address <c.c.c.c>
  port 3230
  tcp keepalive-timeout 1
tcp max-retransmissions 3
max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
  tcp min-retransmit-time 200
  tcp keepalive-timeout 1
  tcp pmtu-enable reset-timeout 3600
  tcp sack-enable
  no tcp cwm

conf t
fcip profile 20
  ip address <c.c.c.c>
  port 3231
  tcp keepalive-timeout 1
tcp max-retransmissions 3
max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
  tcp min-retransmit-time 200
  tcp keepalive-timeout 1
  tcp pmtu-enable reset-timeout 3600
  tcp sack-enable
  no tcp cwm

conf t
interface IPStorage1/2
#  IP address:  d.d.d.d
#  Mask:  y.y.y.y
  ip address <b.b.b.b   y.y.y.y>
  switchport mtu 2500
  no shutdown
exit

conf t
fcip profile 25
  ip address <d.d.d.d>
  port 3232
tcp keepalive-timeout 1
tcp max-retransmissions 3
max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
  tcp min-retransmit-time 200
  tcp keepalive-timeout 1
  tcp pmtu-enable reset-timeout 3600
  tcp sack-enable
  no tcp cwm

conf t
fcip profile 30
  ip address <d.d.d.d>
  port 3233
tcp keepalive-timeout 1
tcp max-retransmissions 3
max-bandwidth-mbps 5000 min-available-bandwidth-mbps 4500 round-trip-time-ms 3
  tcp min-retransmit-time 200
  tcp keepalive-timeout 1
  tcp pmtu-enable reset-timeout 3600
  tcp sack-enable
  no tcp cwm

interface fcip  1
  use-profile 15
# the port # listed in this command is the port that the remote switch is listening on
 peer-info ipaddr <a.a.a.a>  port 3220
  tcp-connection 2
  no ip-compression
  no shutdown
  qos control 48 data 26
exit

interface fcip  2
  use-profile 20
# the port # listed in this command is the port that the remote switch is listening on
 peer-info ipaddr <a.a.a.a>  port 3221
  tcp-connection 5
  no ip-compression
  no shutdown
  qos control 48 data 26
exit

interface fcip  3
  use-profile 25
# the port # listed in this command is the port that the remote switch is listening on
 peer-info ipaddr < b.b.b.b >  port 3222
  tcp-connection 2
  no ip-compression
  no shutdown
  qos control 48 data 26
exit

interface fcip  4
  use-profile 30
# the port # listed in this command is the port that the remote switch is listening on
 peer-info ipaddr < b.b.b.b >  port 3223
  tcp-connection 5
  no ip-compression
  no shutdown
  qos control 48 data 26
exit

conf t
interface fcip  1
shutdown
switchport mode E
switchport trunk mode on
switchport trunk allowed vsan 10
no shutdown
exit

conf t
interface fcip  2
shutdown
switchport mode E
switchport trunk mode on
switchport trunk allowed vsan 20
no shutdown
exit

conf t
interface fcip  3
shutdown
switchport mode E
switchport trunk mode on
switchport trunk allowed vsan 10
no shutdown
exit

conf t
interface fcip  4
shutdown
switchport mode E
switchport trunk mode on
switchport trunk allowed vsan 20
no shutdown
exit

Configuring zoning on a Cisco FC switch

You must assign the switch ports to separate zones to isolate storage (HBA) and controller (FC-VI) traffic.

About this task

These steps must be performed on both FC switch fabrics.

The following steps use the zoning described in the section Zoning for a FibreBridge 7500N in a four-node MetroCluster configuration. Refer to Zoning for FC-VI ports.

Steps
  1. Clear the existing zones and zone set, if present.

    1. Determine which zones and zone sets are active:

      show zoneset active

      FC_switch_A_1# show zoneset active
      
      FC_switch_B_1# show zoneset active
    2. Disable the active zone sets identified in the previous step:

      no zoneset activate name zoneset_name vsan vsan_id

      The following example shows two zone sets being disabled:

      • ZoneSet_A on FC_switch_A_1 in VSAN 10

      • ZoneSet_B on FC_switch_B_1 in VSAN 20

        FC_switch_A_1# no zoneset activate name ZoneSet_A vsan 10
        
        FC_switch_B_1# no zoneset activate name ZoneSet_B vsan 20
    3. After all zone sets are deactivated, clear the zone database:

      clear zone database zone-name

      FC_switch_A_1# clear zone database 10
      FC_switch_A_1# copy running-config startup-config
      
      FC_switch_B_1# clear zone database 20
      FC_switch_B_1# copy running-config startup-config
  2. Obtain the switch worldwide name (WWN):

    show wwn switch

  3. Configure the basic zone settings:

    1. Set the default zoning policy to “permit”:

      no system default zone default-zone permit

    2. Enable the full zone distribution:

      system default zone distribute full

    3. Set the default zoning policy for each VSAN:

      no zone default-zone permit vsanid

    4. Set the default full zone distribution for each VSAN:

      zoneset distribute full vsanid

    FC_switch_A_1# conf t
    FC_switch_A_1(config)# no system default zone default-zone permit
    FC_switch_A_1(config)# system default zone distribute full
    FC_switch_A_1(config)# no zone default-zone permit 10
    FC_switch_A_1(config)# no zone default-zone permit 20
    FC_switch_A_1(config)# zoneset distribute full vsan 10
    FC_switch_A_1(config)# zoneset distribute full vsan 20
    FC_switch_A_1(config)# end
    FC_switch_A_1# copy running-config startup-config
    
    FC_switch_B_1# conf t
    FC_switch_B_1(config)# no system default zone default-zone permit
    FC_switch_B_1(config)# system default zone distribute full
    FC_switch_B_1(config)# no zone default-zone permit 10
    FC_switch_B_1(config)# no zone default-zone permit 20
    FC_switch_B_1(config)# zoneset distribute full vsan 10
    FC_switch_B_1(config)# zoneset distribute full vsan 20
    FC_switch_B_1(config)# end
    FC_switch_B_1# copy running-config startup-config
  4. Create storage zones and add the storage ports to them.

    Note Perform these steps on only one switch in each fabric.

    The zoning depends on the model FC-to-SAS bridge you are using. For details, see the section for your model bridge. The examples show Brocade switch ports, so adjust your ports accordingly.

    Each storage zone contains the HBA initiator ports from all controllers and one single port connecting an FC-to-SAS bridge.

    1. Create the storage zones:

      zone name STOR-zone-name vsan vsanid

    2. Add storage ports to the zone:

      member portswitch WWN

    3. Activate the zone set:

      zoneset activate name STOR-zone-name-setname vsan vsan-id

    FC_switch_A_1# conf t
    FC_switch_A_1(config)# zone name STOR_Zone_1_20_25 vsan 20
    FC_switch_A_1(config-zone)# member interface fc1/5 swwn 20:00:00:05:9b:24:cb:78
    FC_switch_A_1(config-zone)# member interface fc1/9 swwn 20:00:00:05:9b:24:cb:78
    FC_switch_A_1(config-zone)# member interface fc1/17 swwn 20:00:00:05:9b:24:cb:78
    FC_switch_A_1(config-zone)# member interface fc1/21 swwn 20:00:00:05:9b:24:cb:78
    FC_switch_A_1(config-zone)# member interface fc1/5 swwn 20:00:00:05:9b:24:12:99
    FC_switch_A_1(config-zone)# member interface fc1/9 swwn 20:00:00:05:9b:24:12:99
    FC_switch_A_1(config-zone)# member interface fc1/17 swwn 20:00:00:05:9b:24:12:99
    FC_switch_A_1(config-zone)# member interface fc1/21 swwn 20:00:00:05:9b:24:12:99
    FC_switch_A_1(config-zone)# member interface fc1/25 swwn 20:00:00:05:9b:24:cb:78
    FC_switch_A_1(config-zone)# end
    FC_switch_A_1# copy running-config startup-config
  5. Create a storage zone set and add the storage zones to the new set.

    Note Perform these steps on only one switch in the fabric.
    1. Create the storage zone set:

      zoneset name STOR-zone-set-name vsan vsan-id

    2. Add storage zones to the zone set:

      member STOR-zone-name

    3. Activate the zone set:

      zoneset activate name STOR-zone-set-name vsan vsanid

      FC_switch_A_1# conf t
      FC_switch_A_1(config)# zoneset name STORI_Zoneset_1_20 vsan 20
      FC_switch_A_1(config-zoneset)# member STOR_Zone_1_20_25
      ...
      FC_switch_A_1(config-zoneset)# exit
      FC_switch_A_1(config)# zoneset activate name STOR_ZoneSet_1_20 vsan 20
      FC_switch_A_1(config)# exit
      FC_switch_A_1# copy running-config startup-config
  6. Create FCVI zones and add the FCVI ports to them.

    Each FCVI zone contains the FCVI ports from all the controllers of one DR Group.

    Note Perform these steps on only one switch in the fabric.

    The zoning depends on the model FC-to-SAS bridge you are using. For details, see the section for your model bridge. The examples show Brocade switch ports, so adjust your ports accordingly.

    Each storage zone contains the HBA initiator ports from all controllers and one single port connecting an FC-to-SAS bridge.

    1. Create the FCVI zones:

      zone name FCVI-zone-name vsan vsanid

    2. Add FCVI ports to the zone:

      member FCVI-zone-name

    3. Activate the zone set:

      zoneset activate name FCVI-zone-name-set-name vsan vsanid

    FC_switch_A_1# conf t
    FC_switch_A_1(config)# zone name FCVI_Zone_1_10_25 vsan 10
    FC_switch_A_1(config-zone)# member interface fc1/1 swwn20:00:00:05:9b:24:cb:78
    FC_switch_A_1(config-zone)# member interface fc1/2 swwn20:00:00:05:9b:24:cb:78
    FC_switch_A_1(config-zone)# member interface fc1/1 swwn20:00:00:05:9b:24:12:99
    FC_switch_A_1(config-zone)# member interface fc1/2 swwn20:00:00:05:9b:24:12:99
    FC_switch_A_1(config-zone)# end
    FC_switch_A_1# copy running-config startup-config
  7. Create an FCVI zone set and add the FCVI zones to it:

    Note Perform these steps on only one switch in the fabric.
    1. Create the FCVI zone set:

      zoneset name FCVI_zone_set_name vsan vsan-id

    2. Add FCVI zones to the zone set:

      member FCVI_zonename

    3. Activate the zone set:

      zoneset activate name FCVI_zone_set_name vsan vsan-id

    FC_switch_A_1# conf t
    FC_switch_A_1(config)# zoneset name FCVI_Zoneset_1_10 vsan 10
    FC_switch_A_1(config-zoneset)# member FCVI_Zone_1_10_25
    FC_switch_A_1(config-zoneset)# member FCVI_Zone_1_10_29
        ...
    FC_switch_A_1(config-zoneset)# exit
    FC_switch_A_1(config)# zoneset activate name FCVI_ZoneSet_1_10 vsan 10
    FC_switch_A_1(config)# exit
    FC_switch_A_1# copy running-config startup-config
  8. Verify the zoning:

    show zone

  9. Repeat the previous steps on the second FC switch fabric.

Ensuring the FC switch configuration is saved

You must make sure the FC switch configuration is saved to the startup config on all switches.

Step

Issue the following command on both FC switch fabrics:

copy running-config startup-config

FC_switch_A_1# copy running-config startup-config

FC_switch_B_1# copy running-config startup-config