- Index
- Preface
- Product Overview
-
- Configuring Ethernet Interfaces
- Configuring VLANs
- Configuring Private VLANs
- Configuring Rapid PVST+
- Configuring Multiple Spanning Tree
- Configuring STP Extensions
- Configuring Port Channels
- Configuring Access and Trunk Interfaces
- Configuring the MAC Address Table
- Configuring IGMP Snooping
- Configuring Traffic Storm Control
-
- Configuring Fibre Channel Interfaces
- Configuring Domain Parameters
- Configuring N-Port Virtualization
- Configuring VSAN Trunking
- Configuring SAN PortChannels
- Configuring and Managing VSANs
- Configuring and Managing Zones
- Distributing Device Alias Services
- Configuring Fibre Channel Routing Services and Protocols
- Managing FLOGI, Name Server, FDMI, and RSCN Databases
- Discovering SCSI Targets
- Advanced Features and Concepts
- Configuring FC-SP and DHCHAP
- Configuring Port Security
- Configuring Fabric Binding
- Configuring Fabric Configuration Servers
- Configuring Port Tracking
- Information About Zoning
- Configuring Zones
- Zone Sets
- Zone Set Distribution
- Zone Set Duplication
- Verifying Zone Information
- Enhanced Zoning
- About Enhanced Zoning
- Changing from Basic Zoning to Enhanced Zoning
- Changing from Enhanced Zoning to Basic Zoning
- Enabling Enhanced Zoning
- Modifying the Zone Database
- Releasing Zone Database Locks
- Merging the Database
- Configuring Zone Merge Control Policies
- Default Zone Policies
- Configuring System Default Zoning Settings
- Verifying Enhanced Zone Information
- Compacting the Zone Database
- Zone and Zone Set Analysis
- Default Settings
Configuring and Managing Zones
Zoning enables you to set up access control between storage devices or user groups. If you have administrator privileges in your fabric, you can create zones to increase network security and to prevent data loss or corruption. Zoning is enforced by examining the source-destination ID field.
Advanced zoning capabilities specified in the FC-GS-4 and FC-SW-3 standards are supported. You can use either the existing basic zoning capabilities or the advanced, standards-compliant zoning capabilities.
This chapter includes the following sections:
- Information About Zoning
- Configuring Zones
- Zone Sets
- Zone Set Distribution
- Zone Set Duplication
- Verifying Zone Information
- Enhanced Zoning
- Compacting the Zone Database
- Zone and Zone Set Analysis
- Default Settings
Note Table 1-1 lists the differences between zones and VSANs.
Information About Zoning
Zoning is described in the following topics:
- Zoning Features
- Zoning Example
- Zone Implementation
- Active and Full Zone Set Configuration Guidelines
Zoning Features
Zoning includes the following features:
– Members in a zone can access each other; members in different zones cannot access each other.
– If zoning is not activated, all devices are members of the default zone.
– If zoning is activated, any device that is not in an active zone (a zone that is part of an active zone set) is a member of the default zone.
– Devices can belong to more than one zone.
– A physical fabric can have a maximum of 16,000 members. This includes all VSANs in the fabric.
– A zone set can be activated or deactivated as a single entity across all switches in the fabric.
– Only one zone set can be activated at any time.
– A zone can be a member of more than one zone set.
– A zone switch can have a maximum of 500 zone sets.
– When you activate a zone (from any switch), all switches in the fabric receive the active zone set. Additionally, full zone sets are distributed to all switches in the fabric, if this feature is enabled in the source switch.
– If a new switch is added to an existing fabric, zone sets are acquired by the new switch.
– New zones and zone sets can be activated without interrupting traffic on unaffected ports or devices.
– Port world wide name (pWWN)—Specifies the pWWN of an N port attached to the switch as a member of the zone.
– Fabric pWWN—Specifies the WWN of the fabric port (switch port’s WWN). This membership is also referred to as port-based zoning.
– FC ID—Specifies the FC ID of an N port attached to the switch as a member of the zone.
– Interface and switch WWN (sWWN)—Specifies the interface of a switch identified by the sWWN. This membership is also referred to as interface-based zoning.
– Interface and domain ID—Specifies the interface of a switch identified by the domain ID.
– Domain ID and port number—Specifies the domain ID of a Cisco switch domain and additionally specifies a port belonging to a non-Cisco switch.
Note For N ports attached to the switch over a virtual Fibre Channel interface, you can specify zone membership using the pWWN of the N port, the FC ID of the N port, or the fabric pWWN of the virtual Fibre Channel interface.
- Default zone membership includes all ports or WWNs that do not have a specific membership association. Access between default zone members is controlled by the default zone policy.
- You can configure up to 8000 zones per VSAN and a maximum of 8000 zones for all VSANs on the switch.
Note Interface-based zoning only works with Cisco SAN switches. Interface-based zoning does not work for VSANs configured in interop mode.
Zoning Example
Figure 1-1 shows a zone set with two zones, zone 1 and zone 2, in a fabric. Zone 1 provides access from all three hosts (H1, H2, H3) to the data residing on storage systems S1 and S2. Zone 2 restricts the data on S3 to access only by H3. H3 resides in both zones.
Figure 1-1 Fabric with Two Zones
You can use other ways to partition this fabric into zones. Figure 1-2 shows another possibility. Assume that there is a need to isolate storage system S2 for the purpose of testing new software. To achieve this, zone 3 is configured, which contains only host H2 and storage S2. You can restrict access to only H2 and S2 in zone 3, and to H1 and S1 in zone 1.
Figure 1-2 Fabric with Three Zones
Zone Implementation
Cisco Nexus 5000 Series switches automatically support the following basic zone features (no additional configuration is required):
- Zones are contained in a VSAN.
- Hard zoning cannot be disabled.
- Name server queries are soft-zoned.
- Only active zone sets are distributed.
- Unzoned devices cannot access each other.
- A zone or zone set with the same name can exist in each VSAN.
- Each VSAN has a full database and an active database.
- Active zone sets cannot be changed, without activating a full zone database.
- Active zone sets are preserved across switch reboots.
- Changes to the full database must be explicitly saved.
- Zone reactivation (a zone set is active and you activate another zone set) does not disrupt existing traffic.
If required, you can additionally configure the following zone features:
- Propagate full zone sets to all switches on a per VSAN basis.
- Change the default policy for unzoned members.
- Interoperate with other vendors by configuring a VSAN in the interop mode. You can also configure one VSAN in the interop mode and another VSAN in the basic mode in the same switch without disrupting each other.
- Bring E ports out of isolation.
Active and Full Zone Set Configuration Guidelines
Before configuring a zone set, consider the following guidelines:
- Each VSAN can have multiple zone sets but only one zone set can be active at any given time.
- When you create a zone set, that zone set becomes a part of the full zone set.
- When you activate a zone set, a copy of the zone set from the full zone set is used to enforce zoning, and is called the active zone set. An active zone set cannot be modified. A zone that is part of an active zone set is called an active zone.
- The administrator can modify the full zone set even if a zone set with the same name is active. However, the modification will be enforced only upon reactivation.
- When the activation is done, the active zone set is automatically stored in persistent configuration. This enables the switch to preserve the active zone set information across switch resets.
- All other switches in the fabric receive the active zone set so they can enforce zoning in their respective switches.
- Hard and soft zoning are implemented using the active zone set. Modifications take effect during zone set activation.
- An FC ID or Nx port that is not part of the active zone set belongs to the default zone and the default zone information is not distributed to other switches.
Note If one zone set is active and you activate another zone set, the currently active zone set is automatically deactivated. You do not need to explicitly deactivate the currently active zone set before activating a new zone set.
Figure 1-3 shows a zone being added to an activated zone set.
Figure 1-3 Active and Full Zone Sets
Configuring Zones
To configure a zone and assign a zone name, perform this task:
Tip Use the show wwn switch command to retrieve the sWWN. If you do not provide a sWWN, the software automatically uses the local sWWN.
The following example shows how to configure zone members:
switch(config-zone)# member type value
switch(config-zone)# member pwwn 10:00:00:23:45:67:89:ab
switch(config-zone)# member fwwn 10:01:10:01:10:ab:cd:ef
switch(config-zone)# member fcid 0xce00d1
switch(config-zone)# member fcalias Payroll
switch(config-zone)# member domain-id 2 portnumber 23
Local sWWN interface examples:
switch(config-zone)# member interface fc 2/1
Remote sWWN interface example:
switch(config-zone)# member interface fc2/1 swwn 20:00:00:05:30:00:4a:de
Zone Sets
This section describes zone sets and includes the following topics:
- Activating a Zone Set
- About the Default Zone
- Configuring the Default Zone Access Permission
- About FC Alias Creation
- Creating FC Aliases
- Creating Zone Sets and Adding Member Zones
- Zone Enforcement
In Figure 1-4, two separate sets are created, each with its own membership hierarchy and zone members.
Figure 1-4 Hierarchy of Zone Sets, Zones, and Zone Members
Zones provide a method for specifying access control, while zone sets are a grouping of zones to enforce access control in the fabric. Either zone set A or zone set B can be activated (but not together).
Tip Zone sets are configured with the names of the member zones and the VSAN (if the zone set is in a configured VSAN).
Activating a Zone Set
Changes to a zone set do not take effect in a full zone set until you activate it.
To activate or deactivate an existing zone set, perform this task:
|
|
|
---|---|---|
switch(config)# zoneset activate name zoneset-name vsan vsan-id |
||
switch(config)# no zoneset activate name zoneset-name vsan vsan-id |
About the Default Zone
Each member of a fabric (in effect a device attached to an Nx port) can belong to any zone. If a member is not part of any active zone, it is considered to be part of the default zone. Therefore, if no zone set is active in the fabric, all devices are considered to be in the default zone. Even though a member can belong to multiple zones, a member that is part of the default zone cannot be part of any other zone. The switch determines whether a port is a member of the default zone when the attached port comes up.
Note Unlike configured zones, default zone information is not distributed to the other switches in the fabric.
Traffic can either be permitted or denied among members of the default zone. This information is not distributed to all switches; it must be configured in each switch.
Note When the switch is initialized for the first time, no zones are configured and all members are considered to be part of the default zone. Members are not permitted to communicate with each other.
Configure the default zone policy on each switch in the fabric. If you change the default zone policy on one switch in a fabric, be sure to change it on all the other switches in the fabric.
Note The default settings for default zone configurations can be changed.
The default zone members are explicitly listed when the default policy is configured as permit or when a zone set is active. When the default policy is configured as deny, the members of this zone are not explicitly enumerated when you view the active zone set.
Configuring the Default Zone Access Permission
To permit or deny traffic to members in the default zone, perform this task:
|
|
|
---|---|---|
About FC Alias Creation
You can assign an alias name and configure an alias member using the following values:
- pWWN—The WWN of the N port is in hex format (for example, 10:00:00:23:45:67:89:ab).
- fWWN—The WWN of the fabric port name is in hex format (for example, 10:00:00:23:45:67:89:ab).
- FC ID—The N port ID is in 0xhhhhhh format (for example, 0xce00d1).
- Domain ID—The domain ID is an integer from 1 to 239. A mandatory port number of a non-Cisco switch is required to complete this membership configuration.
- Interface—Interface-based zoning is similar to port-based zoning because the switch interface is used to configure the zone. You can specify a switch interface as a zone member for both local and remote switches. To specify a remote switch, enter the remote switch WWN (sWWN) or the domain ID in the particular VSAN.
Tip The switch supports a maximum of 2048 aliases per VSAN.
Creating FC Aliases
To create an alias, perform this task:
The following example shows how to configure different types of member alias:
Creating Zone Sets and Adding Member Zones
To create a zone set to include several zones, perform this task:
Tip You do not have to copy the running configuration to the startup configuration to store the active zone set. However, you need to copy the running configuration to the startup configuration to explicitly store full zone sets.
Note Be sure you understand how device alias modes work before enabling them. See Chapter 1, “Distributing Device Alias Services” for details and requirements about device alias modes.
Zone Enforcement
Zoning can be enforced in two ways: soft and hard. Each end device (N port) discovers other devices in the fabric by querying the name server. When a device logs in to the name server, the name server returns the list of other devices that can be accessed by the querying device. If an N port does not know about the FC IDs of other devices outside its zone, it cannot access those devices.
In soft zoning, zoning restrictions are applied only during interaction between the name server and the end device. If an end device somehow knows the FC ID of a device outside its zone, it can access that device.
Hard zoning is enforced by the hardware on each frame sent by an N port. As frames enter the switch, source-destination IDs are compared with permitted combinations to allow the frame at wire speed. Hard zoning is applied to all forms of zoning.
Note Hard zoning enforces zoning restrictions on every frame, and prevents unauthorized access.
Cisco Nexus 5000 Series switches support both hard and soft zoning.
Zone Set Distribution
You can distribute full zone sets using one of two methods: one-time distribution using the zoneset distribute vsan command at the EXEC mode level or full zone set distribution using the zoneset distribute full vsan command at the configuration mode level. Table 1-1 lists the differences between the methods.
This section describes zone set distribution and includes the following topics:
- Enabling Full Zone Set Distribution
- Enabling a One-Time Distribution
- About Recovering from Link Isolation
- Importing and Exporting Zone Sets
Enabling Full Zone Set Distribution
All switches in the Cisco Nexus 5000 Series distribute active zone sets when new E port links come up or when a new zone set is activated in a VSAN. The zone set distribution takes effect while sending merge requests to the adjacent switch or while activating a zone set.
To enable full zone set and active zone set distribution to all switches on a per VSAN basis, perform this task:
|
|
|
---|---|---|
Enables sending a full zone set along with an active zone set. |
Enabling a One-Time Distribution
You can perform a one-time distribution of inactive, unmodified zone sets throughout the fabric.
Use the zoneset distribute vsan vsan-id command in EXEC mode to perform this distribution.
This command only distributes the full zone set information, as it does not save the information to the startup configuration. You must explicitly enter the copy running-config startup-config command to save the full zone set information to the startup configuration.
Note The one-time distribution of the full zone set is supported in interop 2 and interop 3 modes, and not in interop 1 mode.
Use the show zone status vsan vsan-id command to check the status of the one-time zone set distribution request.
About Recovering from Link Isolation
When two switches in a fabric are merged using a TE or E port, these TE and E ports may become isolated when the active zone set databases are different between the two switches or fabrics. When a TE port or an E port become isolated, you can recover that port from its isolated state using one of three options:
- Import the neighboring switch’s active zone set database and replace the current active zone set (see Figure 1-5).
- Export the current database to the neighboring switch.
- Manually resolve the conflict by editing the full zone set, activating the corrected zone set, and then bringing up the link.
Figure 1-5 Importing and Exporting the Database
Importing and Exporting Zone Sets
To import or export the zone set information from or to an adjacent switch, perform this task:
Note Perform the import and export operations from a single switch. Importing from one switch and exporting from another switch can lead to isolation again.
Zone Set Duplication
You can make a copy and then edit it without altering the existing active zone set. You can copy an active zone set from the bootflash: directory, volatile: directory, or slot0 to one of the following areas:
The active zone set is not part of the full zone set. You cannot make changes to an existing zone set and activate it if the full zone set is lost or is not propagated.
This section includes the following topics:
- Copying Zone Sets
- Renaming Zones, Zone Sets, and Aliases
- Cloning Zones, Zone Sets, FC Aliases, and Zone Attribute Groups
- Clearing the Zone Server Database
Copying Zone Sets
On Cisco Nexus 5000 Series switches, you cannot edit an active zone set. However, you can copy an active zone set to create a new zone set that you can edit.
To make a copy of a zone set, perform this task:
Renaming Zones, Zone Sets, and Aliases
To rename a zone, zone set, fcalias, or zone-attribute-group, perform this task:
|
|
|
---|---|---|
switch(config)# zone-attribute-group rename oldname newname vsan vsan-id |
||
Activates the zone set and updates the new zone name in the active zone set. |
Cloning Zones, Zone Sets, FC Aliases, and Zone Attribute Groups
To clone a zone, zone set, fcalias, or zone-attribute-group, perform this task:
|
|
|
---|---|---|
switch(config)# zone-attribute-group clone oldname newname vsan vsan-id |
||
Activates the zone set and updates the new zone name in the active zone set. |
Clearing the Zone Server Database
You can clear all configured information in the zone server database for the specified VSAN.
To clear the zone server database, use the following command:
Note After entering a clear zone database command, you must explicitly enter the copy running-config startup-config to ensure that the running configuration is used when the switch reboots.
Note Clearing a zone set only erases the full zone database, not the active zone database.
Verifying Zone Information
You can view any zone information by using the show command. If you request information for a specific object (for example, a specific zone, zone set, VSAN, or alias, or keywords such as brief or active), only information for the specified object is displayed.
The following example shows how to display zone information for all VSANs:
The following example shows how to display zone information for a specific VSAN:
The following example shows how to display the configured zone sets for a range of VSANs:
The following example shows how to display the members of a specific zone:
The following example shows how to display fcalias configuration:
The following example shows how to display all zones to which a member belongs:
The following example shows how to display the number of control frames exchanged with other switches:
The following example shows how to display the active zone set:
The following example shows how to display the active zones:
The following example shows how to display the zone status:
Enhanced Zoning
The zoning feature complies with the FC-GS-4 and FC-SW-3 standards. Both standards support the basic zoning functionalities explained in the previous section and the enhanced zoning functionalities described in this section.
This section includes the following topics:
- About Enhanced Zoning
- Changing from Basic Zoning to Enhanced Zoning
- Changing from Enhanced Zoning to Basic Zoning
- Enabling Enhanced Zoning
- Modifying the Zone Database
- Releasing Zone Database Locks
- Merging the Database
- Configuring Zone Merge Control Policies
- Default Zone Policies
- Configuring System Default Zoning Settings
- Verifying Enhanced Zone Information
About Enhanced Zoning
Table 1-2 lists the advantages of the enhanced zoning feature in all switches in the Cisco Nexus 5000 Series.
Changing from Basic Zoning to Enhanced Zoning
To change to the enhanced zoning mode from the basic mode, perform this task:
Step 1 Verify that all switches in the fabric are capable of working in the enhanced mode.
If one or more switches are not capable of working in enhanced mode, then your request to move to enhanced mode is rejected.
Step 2 Set the operation mode to enhanced zoning mode.
You will automatically start a session, acquire a fabric wide lock, distribute the active and full zoning database using the enhanced zoning data structures, distribute zoning policies and then release the lock. All switches in the fabric then move to the enhanced zoning mode.
Tip After moving from basic zoning to enhanced zoning, we recommend that you save the running configuration.
Changing from Enhanced Zoning to Basic Zoning
Cisco SAN switches allow you to change from enhanced zoning to basic zoning to enable you to downgrade and upgrade to other Cisco NX-OS releases.
To change to the basic zoning mode from the enhanced mode, perform this task:
Step 1 Verify that the active and full zone set do not contain any configuration that is specific to the enhanced zoning mode.
If such configurations exist, delete them before proceeding with this procedure. If you do not delete the existing configuration, the switch software automatically removes them.
Step 2 Set the operation mode to basic zoning mode.
You will automatically start a session, acquire a fabric-wide lock, distribute the zoning information using the basic zoning data structure, apply the configuration changes and release the lock from all switches in the fabric. All switches in the fabric then move to basic zoning mode.
Enabling Enhanced Zoning
By default, the enhanced zoning feature is disabled in all switches in the Cisco Nexus 5000 Series.
To enable enhanced zoning in a VSAN, perform this task:
|
|
|
---|---|---|
Modifying the Zone Database
Modifications to the zone database is done within a session. A session is created at the time of the first successful configuration command. On creation of a session, a copy of the zone database is created. Any changes done within the session are performed on this copy of the zoning database. These changes in the copy zoning database are not applied to the effective zoning database until you commit the changes. Once you apply the changes, the session is closed.
If the fabric is locked by another user and for some reason the lock is not cleared, you can force the operation and close the session. You must have permission (role) to clear the lock in this switch and perform the operation on the switch from where the session was originally created.
To commit or discard changes to the zoning database in a VSAN, perform this task:
Releasing Zone Database Locks
To release the session lock on the zoning database on the switches in a VSAN, use the no zone commit vsan command from the switch where the database was initially locked.
If session locks remain on remote switches after using the no zone commit vsan command, you can use the clear zone lock vsan command on the remote switches.
Note We recommend using the no zone commit vsan command first to release the session lock in the fabric. If that fails, use the clear zone lock vsan command on the remote switches where the session is still locked.
Merging the Database
The merge method depends on the fabric-wide merge control setting:
- Restrict—If the two databases are not identical, the ISLs between the switches are isolated.
- Allow—The two databases are merged using the merge rules specified in Table 1-3 .
|
|
|
|
---|---|---|---|
The databases contain zone sets with the same name1 but different zones, aliases, and attributes groups. |
|||
The databases contains a zone, zone alias, or zone attribute group object with same name 1 but different members. |
|||
The adjacent database information populates the local database. |
|||
The local database information populates the adjacent database. |
1.In the enhanced zoning mode, the active zone set does not have a name in interop mode 1. The zone set names are only present for full zone sets. |
The merge process operates as follows:
1. The software compares the protocol versions. If the protocol versions differ, then the ISL is isolated.
2. If the protocol versions are the same, then the zone policies are compared. If the zone policies differ, then the ISL is isolated.
3. If the zone merge options are the same, then the comparison is implemented based on the merge control setting.
a. If the setting is restrict, the active zone set and the full zone set should be identical. Otherwise, the link is isolated.
b. If the setting is allow, then the merge rules are used to perform the merge.
Configuring Zone Merge Control Policies
To configure merge control policies, perform this task:
|
|
|
---|---|---|
Configures a restricted merge control setting for this VSAN. |
||
Defaults to using the allow merge control setting for this VSAN. |
||
Default Zone Policies
To permit or deny traffic in the default zone, perform this task:
|
|
|
---|---|---|
Denies traffic flow to default zone members and reverts to factory default. |
||
Configuring System Default Zoning Settings
You can configure default settings for default zone policies and full zone distribution for new VSANs on the switch. To configure switch-wide default settings, perform this task:
Note Since VSAN 1 is the default VSAN and is always present on the switch, the system default zone commands have no effect on VSAN 1.
Verifying Enhanced Zone Information
The following example shows how to display the zone status for a specified VSAN:
Compacting the Zone Database
You can delete excess zones and compact the zone database for the VSAN.
Note A merge failure occurs when a switch supports more than 2000 zones per VSAN but its neighbor does not. Also, zone set activation can fail if the switch has more than 2000 zones per VSAN and not all switches in the fabric support more than 2000 zones per VSAN.
To delete zones and compact the zone database for a VSAN, perform this task:
|
|
|
---|---|---|
Deletes a zone to reduce the number of zones to 2000 or fewer. |
||
Compacts the zone database for the specified VSAN to recover the zone ID released when a zone was deleted. |
Zone and Zone Set Analysis
To better manage the zones and zone sets on your switch, you can display zone and zone set information using the show zone analysis command.
The following example shows how to display full zoning analysis:
The following example shows how to display active zoning analysis:
See the Cisco Nexus 5000 Series Switch Command Reference for the description of the information displayed in the command output.
Default Settings
Table 1-4 lists the default settings for basic zone parameters.
|
|
---|---|