Supported Platforms
Starting with Cisco NX-OS release 7.0(3)I7(1), use the Nexus Switch Platform Support Matrix to know from which Cisco NX-OS releases various Cisco Nexus 9000 and 3000 switches support a selected feature.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter contains the following sections:
Starting with Cisco NX-OS release 7.0(3)I7(1), use the Nexus Switch Platform Support Matrix to know from which Cisco NX-OS releases various Cisco Nexus 9000 and 3000 switches support a selected feature.
This section explains how to install the licensing for FC NPV.
Enabling the port license is required for fibre channel (FC) ports.
Install the license key file: Example:
|
A switch is in NPV mode after enabling NPV. NPV mode applies to an entire switch. All end devices connected to a switch that are in NPV mode must log in as an N port to use this feature (loop-attached devices are not supported). All links from the edge switches (in NPV mode) to the NPV core switches are established as NP ports (not E ports), which are used for typical inter-switch links. NPIV is used by the switches in NPV mode to log in to multiple end devices that share a link to the NPV core switch.
The following figure shows an interface-level view of an FC NPV configuration.
FC NPV provides the following:
Increased number of hosts that connect to the fabric without adding domain IDs in the fabric
Connection of FC and FCoE hosts and targets to SAN fabrics using FC interfaces
Automatic traffic mapping
Static traffic mapping
In FC NPV mode, the edge switch relays all traffic to the core switch and shares the domain ID of the core switch.
FC NPV is enabled by installing and enabling feature-set fcoe-npv. You cannot configure FC NPV mode on a per-interface basis. FC NPV mode applies to the entire switch.
In Cisco Nexus 9000 Series switches, server interfaces can be FC or vFC interfaces.
Server interfaces are F ports on the edge switch that connect to the servers. A server interface may support multiple end devices by enabling the N port identifier virtualization (NPIV) feature. NPIV provides a means to assign multiple FC IDs to a single N port, which allows the server to assign unique FC IDs to different applications.
Note |
To use NPIV, enable the NPIV feature and reinitialize the server interfaces that will support multiple devices. |
FC server interfaces should be in trunk mode off. Trunk mode on is not supported.
vFC server interfaces should be in trunk mode on.
Server interfaces are automatically distributed among the NP uplinks to the core switch. All of the end devices connected to a server interface are mapped to the same NP uplink.
When you connect a 16G host adapter to a 32G SFP port on Cisco Nexus 93360YC-FX and/or 93360YC-FX2 switches, the link may not come up when the speed is configured as auto speed. Or sometimes, it defaults to 8G speed. Then, to use 16G speed, you must manually configure the port using the command switchport speed 16000.
8G speed is not supported for server and target interfaces.
The default speed is auto.
In Cisco Nexus 9000 Series switches, NP uplink interfaces can be native Fibre Channel interfaces, virtual fiber channel interfaces, SAN port channel interfaces, or virtual ethernet port-channel interfaces.
All interfaces from the edge switch to the core switch are configured as proxy N ports (NP ports).
An NP uplink is a connection from an NP port on the edge switch to an F port on the core switch. When an NP uplink is established, the edge switch sends a fabric login message (FLOGI) to the core switch then (if the FLOGI is successful) registers itself with the name server on the core switch. Subsequent FLOGIs from end devices connected to this NP uplink are forwarded as-is to the core switch. Subsequent FLOGIs from the same VSAN are forwarded as fdisc.
Note |
In the switch CLI configuration commands and output displays, NP uplinks are called External Interfaces. |
The default speed of NP links is set to auto.
The features below must be enabled on the core switch:
feature npiv
feature fport-channel-trunk
If the FC uplink speed is 8G, the fill pattern should be configured as IDLE on the core switch.
Note |
Following is an example of configuring IDLE fill pattern on a Cisco MDS switch:
|
Note |
|
SAN Port Channels
A SAN port channel is a logical interface that combines a set of FC interfaces connected to the same fibre channel node and operates as one link.
SAN port channels support bandwidth utilization and availability.
SAN port channels on Cisco Nexus 9000 Series switches are mainly used to connect to MDS cores and to provide optimal bandwidth utilization and transparent failover between the uplinks of a VSAN.
When you configure a SAN port channel, it gets created with default values . You can modify all the the default values, except the channel mode. You must connect each switch to same number of interfaces on either side of a SAN port channel. Otherwise, you see a SAN port channel error.
The number of SAN port channels and vFC port channels, together, can be only 8 on the Cisco Nexus 9000 Series switch.
The maximum number of FC interfaces that can be combined into a SAN port channel is limited to 16.
The default channel mode on Cisco Nexus 9000 Series switches for SAN port channels is active; this cannot be changed.
This section explains how to create a SAN port channel.
Step 1 |
switch# configure terminal Enters the global configuration mode. |
Step 2 |
switch(config)# interface san-port-channel channel-number Creates the specified SAN port channel using the default mode (on). The SAN port channel number is in the range of 1 to 256 |
switch(config)# interface san-port-channel 1
switch(config-if)#
A SAN port channel is configured with channel mode active by default. When active, the member ports initiate port-channel-protocol negotiation with the peer port(s) regardless of the channel-group mode of the peer port. If the peer port, while configured in a channel group, does not support the port-channel protocol, or responds with a nonnegotiable status, the port channel will be disabled. The active port -channel mode allows automatic recovery without explicitly enabling and disabling the port-channel-member ports at either end.
When you delete the SAN port channel, the corresponding channel membership is also deleted.
If you delete the SAN port channel for one port, then the individual ports within the deleted SAN port channel retain the compatibility parameter settings (speed, mode, port VSAN, allowed VSAN, and port security). You can explicitly change those settings as required.
This section explains how to delete a SAN port channel.
Step 1 |
switch# configure terminal Enters global configuration mode. |
Step 2 |
switch(config)#no interface san-port-channel channel-number Deletes the specified port channel, its associated interface mappings, and the hardware associations for this SAN port channel. |
switch(config)# no interface san-port-channel 1
The SAN port channel 1 is deleted and all its members are disabled. Please do the same operation on the switch at the other end of the SAN port channel.
You can add or remove a physical Fibre Channel interface (or a range of interfaces) to an existing SAN port channel. The compatible parameters on the configuration are mapped to the SAN port channel. Adding an interface to a SAN port channel increases the channel size and bandwidth of the SAN port channel. Removing an interface from a SAN port channel decreases the channel size and bandwidth of the SAN port channel.
Note |
Virtual Fibre Channel interfaces cannot be added to SAN port channels. |
This section explains how to add an interface to a SAN port channel.
Step 1 |
switch# configure terminal Enters global configuration mode. |
Step 2 |
switch(config)# interface type slot / port / BO port Enters configuration mode for the specified interface. |
Step 3 |
switch(config-if)# channel-group channel-number Adds the Fibre Channel interface to the specified channel group. If the channel group does not exist, it is created. The port is shut down. |
The following example adds an interface to a SAN port channel:
switch(config)# interface fc9/10
switch(config-if)# channel-group 15
fc9/10 is added to san-port-channel 15 and is disabled. Please do the same operation on the switch at the other end of the san-port-channel, then do “no shutdown” at both ends to bring them up
You can force the port configuration to be overwritten by the SAN port channel. In this case, the interface is added to a SAN port channel.
Note |
When SAN port channels are created from within an interface, the force option cannot be used. |
This section explains how to force the addition of a port to a SAN port channel.
Step 1 |
switch# configure terminal Enters global configuration mode. |
Step 2 |
switch(config)#interface type slot / port / BO port Enters configuration mode for the specified interface. |
Step 3 |
switch(config-if)# channel-group channel-number force Forces the addition of the interface into the specified channel group. The E port is shut down. |
The following example adds an interface to a SAN port channel:
switch(config)# interface fc9/10
switch(config-if)# channel-group 15 force
fc9/10 added to san-port-channel 15 and disabled. Please do the same operation on the switch at the other end of the san-port-channel, then perform a no shutdown at both ends to bring them up
When a physical interface is deleted from the SAN port channel, the channel membership is automatically updated. If the deleted interface is the last operational interface, then the port channel status is changed to a down state. Deleting an interface from a SAN port channel decreases the channel size and bandwidth of the SAN port channel.
This section explains how to delete a physical interface (or a range of physical interfaces) from a SAN port channel.
Step 1 |
switch(config)# interface type slot /port / BO port Enters configuration mode for the specified interface. |
Step 2 |
switch(config)#shut Shuts down the interface before removing the specified channel group. |
Step 3 |
switch(config)#no channel-group channel-number Deletes the physical Fibre Channel interface from the specified channel group. |
The following example deletes an interface from a SAN port channel:
switch(config)# interface fc9/10
switch(config-if)# shut
switch(config-if)# no channel-group 15
fc9/10 is removed from the SAN port-channel 15 and disabled.
Please do the same operation on the switch at the other end of the san-port-channel
You can view specific information about existing SAN port channels at any time from EXEC mode. The following show commands provide further details on existing SAN port channels.
The show san-port-channel summary command displays a summary of SAN port channels within the switch. A one-line summary of each SAN port channel provides the administrative state, the operational state, the number of attached and active interfaces (up), and the first operational port (FOP), which is the primary operational interface selected in the SAN port channel to carry control-plane traffic (no load-balancing). The FOP is the first port that comes up in a SAN port channel and can change if the port goes down. The FOP is also identified by an asterisk ( *).
To display VSAN configuration information, perform one of the following tasks:
Step 1 |
switch# show san-port-channel summary | database | consistency [ details ] | usage | compatibility-parameters Displays SAN port channel information. |
Step 2 |
switch# show san-port-channel database interface san-port-channel channel-number Displays information for the specified SAN port channel. |
Step 3 |
switch# show interface type slot / port / BO port Displays VSAN configuration information for the specified Fibre Channel interface. |
The following example shows how to display a summary of SAN port channel information:
switch# show san-port-channel summary
------------------------------------------------------------------------------
Interface Total Ports Oper Ports First Oper Port-
------------------------------------------------------------------------------
san-port-channel 7 2 0 –
san-port-channel 8 2 0 –
san-port-channel 9 2 2
The following example shows how to display SAN port channel consistency:switch# show san-port-channel consistency
Database is consistent
The following example shows how to display details of the used and unused port channel numbers:
switch# show san-port-channel usage
Totally 3 port-channel numbers used
===================================
Used : 77 - 79
Unused: 1 - 76, 80 - 256
When an NP port becomes operational, the switch first logs itself in to the core switch by sending a FLOGI request (using the port WWN of the NP port).
After completing the FLOGI request, the switch registers itself with the fabric name server on the core switch (using the symbolic port name of the NP port and the IP address of the edge switch).
The following table identifies port and node names in the edge switch used in FC NPV mode.
Parameter |
Derived From |
||
---|---|---|---|
pWWN |
The fWWN of the NP port on the edge switch. |
||
nWWN |
The VSAN-based sWWN of the edge switch. |
||
symbolic port name |
The edge switch name and NP port interface string.
|
||
IP address |
The IP address of the edge switch. |
||
symbolic node name |
The edge switch name. |
NPV Traffic Management
NPV supports automatic selection of NP uplinks. When a server interface is brought up, the NP uplink interface with the minimum load is selected from the available NP uplinks in the same VSAN as the server interface.
When a new NP uplink interface becomes operational, the existing load is not redistributed automatically to include the newly available uplink. Server interfaces that become operational after the NP uplink can select the new NP uplink.
FC NPV supports traffic maps. A traffic map allows you to specify the NP uplinks that a server interface can use to connect to the core switches.
In Release 7.0(3)I7(2) and later software releases, FC NPV supports traffic maps. A traffic map allows you to specify the NP uplinks that a server interface can use to connect to the core switches.
Note |
When an FC NPV traffic map is configured for a server interface, the server interface must select only from the NP uplinks in its traffic map. If none of the specified NP uplinks are operational, the server remains in a non-operational state. |
The FC NPV traffic map feature provides the following benefits:
Facilitates traffic engineering by allowing configuration of a fixed set of NP uplinks for a specific server interface (or range of server interfaces).
Ensures correct operation of the persistent FC ID feature; this is because a server interface will always connect to the same NP uplink (or one of a specified set of NP uplinks) after an interface reinitialization or switch reboot.
FC NPV supports disruptive load balancing of server logins. When disruptive load balancing is enabled, FC NPV redistributes the server interfaces across all available NP uplinks when a new NP uplink becomes operational. To move a server interface from one NP uplink to another NP uplink, FC NPV forces reinitialization of the server interface so that the server performs a new login to the core switch.
In Release 7.0(3)I7(2) and later software releases, FC NPV supports disruptive load balancing of server logins. When disruptive load balancing is enabled, FC NPV redistributes the server interfaces across all available NP uplinks when a new NP uplink becomes operational. To move a server interface from one NP uplink to another NP uplink, FC NPV forces reinitialization of the server interface so that the server performs a new login to the core switch.
Only server interfaces that are moved to a different uplink are reinitialized. A system message is generated for each server interface that is moved.
Note |
Redistributing a server interface causes traffic disruption to the attached end devices. Adding a member to the existing port-channel does not trigger disruptive auto load-balance. |
To avoid disruption of server traffic, you should enable this feature only after adding a new NP uplink, and then disable it again after the server interfaces have been redistributed.
If disruptive load balancing is not enabled, you can manually reinitialize some or all of the server interfaces to distribute server traffic to new NP uplink interfaces.
When deploying FC NPV traffic management, follow these guidelines:
When configuring FC NPV, note the following guidelines and limitations:
In-order data delivery is not required in FC NPV mode because the exchange between two end devices always takes the same uplink from the edge switch to the core. Upstream of the edge switch, core switches will enforce in-order delivery if configured.
You can configure zoning for end devices that are connected to edge switches using all the available member types on the core switch. However, the preferred way of zoning servers connected to any switch in NPV mode is via PWWN, device-alias and fcalias. You must place multiple servers in the same zone only when using smart zoning. For more information about smart zoning on Cisco MDS switches, refer the chapter Configuring and Managing Zones in Cisco MDS 9000 Series Fabric Configuration Guide .
Port tracking is not supported in FC NPV mode.
Port security is supported on the core switch for devices logged in through the FC NPV switch. Port security is enabled on the core switch on a per-interface basis. To enable port security on the core switch for devices that log in through an FC NPV switch, you must adhere to the following requirements:
The internal FLOGI must be in the port security database; in this way, the port on the core switch will allow communications and links.
All the end device pWWNs must also be in the port security database.
Edge switches can connect to multiple core switches. In other words, different NP ports can be connected to different core switches.
If a server interface goes down and then returns to service, the interface is not guaranteed to be assigned to the same NP uplink.
The server interface is only operational when its assigned NP uplink is operational.
Both servers and targets can be connected to the switch when in FC NPV mode.
Fibre Channel switching is not performed in the edge switch; all traffic is switched in the core switch.
FC NPV supports NPIV-capable servers. This capability is called nested NPIV.
Connecting two Cisco FC NPV switches together is not supported.
Only F and NP ports are supported in FC NPV mode.
Speed auto-negotiation is supported only for Cisco Nexus 93180YC-FXand N9k-C93360YC-FX2 switches. The default speed is set to auto.
The default port speed is 16000.
Nexus 9000 only supports the IDLE fill pattern on 8 Gbps Fibre Channel interfaces. For Nexus 9000 FC interface to operate at 8 Gbps, peer device must be configured to use a matching IDLE fill pattern. Most server and target FC interfaces do not support this and thus cannot connect to Nexus 9000 at 8 Gbps. To interoperate with other Fibre Channel switches at 8 Gbps ensure the peer switch FC interface also uses a matching IDLE fill pattern. For Cisco MDS switches, configure using the switchport fill-pattern interface configuration command. To connect to a peer Nexus 9000 at 8 Gbps, use no fill pattern configuration, as both devices use matching IDLE fill patterns by default.
The default port-speed for all FC interfaces is auto for Cisco Nexus N9k-C93180YC-FX and N9k-C93360YC-FX2 switches.
The receive B2B credit value is 64 in N9K-C93180YC-FX and 32 in N9K-C93360YC-FX2. This is not configurable.
When a san-port channel is created, it is created in channel mode active by default; channel mode on is not supported for NPV switch.
FC NPV (upto 16G) is supported on N9K-C93180YC-FX, beginning with Cisco NX-OS Release 7.0(3)I7(2).
vFC flap may be required to bring up N Port vFC interfaces after changing the FCoE FC map.
FC-NPV (up to 32G) and FCoE-NPV are supported on N9K-C93180YC-FX and N9k-C93360YC-FX2 switches both as NP uplink and F host port.
Configuring NPV
FC NPV is enabled when feature-set fcoe-npv is installed and enabled.
To enable fcoe-npv, perform this task:
Note |
This enables both FC and FCoE NPV mode. |
Command or Action | Purpose | |
---|---|---|
Step 1 |
switch# configure terminal |
Enters configuration mode. |
Step 2 |
switch(config)# install feature-set fcoe-npv |
Installs the FC and FCoE NPV feature set. |
Step 3 |
switch(config-npv)# feature-set fcoe-npv |
Enables FC and FCoE NPV. |
This section explains how to convert Ethernet ports to fibre channel ports.
This task requires installing and enabling the port license. For more information, see Installing the Fibre Channel Port License.
Step 1 |
Perform TCAM carving. Example:
|
||
Step 2 |
Confirm that feature-set fcoe-npv is installed and enabled. Example:
|
||
Step 3 |
Convert the port(s) to FC. Example:In this example, an Ethernet interface is being converted to FC interface on Cisco Nexus 9300-FX switches.
In this example, an Ethernet interface is being converted to FC interface on Cisco Nexus N9K-93360YC-FX2 switches. In this switch, four ports form a port group. For example the first port group will be 1,2,49,50; the second port group will be 3,4,51,52 and likewise.
|
||
Step 4 |
Convert the FC interface back to Ethernet port(s). Example:In this example, an FC interface is being converted back to Ethernet interface on Cisco Nexus 9300-FX switches.
In this example, an FC interface is being converted back to Ethernet interface on a Cisco Nexus N9K-93360YC-FX2 switch.
|
This section explains how to enable the licensing for FC NPV.
To enable the port license, you must shut down the fibre channel (FC) ports.
Enable the port license. Example:
|
After you enable FC NPV, you should configure the NP uplink interfaces and the server interfaces.
To configure an NP uplink interface, perform this task:
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
switch# configure terminal |
Enters global configuration mode. |
||
Step 2 |
switch(config)# interface { fc slot/port/BO port | san-port-channel <number> } |
Selects an interface (Fibre Channel or SAN port channel) that will be connected to the core FC NPV switch. |
||
Step 3 |
switch(config-if)# switchport speed speed |
Sets the speed, which can be 4G, 8G, 16G, 32G or auto.
|
||
Step 4 |
switch(config-if)# switchport mode NP |
Configures the interface as an NP port. |
||
Step 5 |
switch(config-if)# no shutdown |
Brings up the interface. |
To configure a server interface, perform this task:
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
switch# configure terminal |
Enters global configuration mode. |
||
Step 2 |
switch(config)# interface fc slot/port |
Creates an interface that connects the server to the NPV switch. |
||
Step 3 |
switch(config-if)# switchport speed speed |
Sets the speed, which can be 4G, 8G, 16G, 32G or auto.
|
||
Step 4 |
switch(config-if)# switchport mode F |
Configures the interface as an F port. |
||
Step 5 |
switch(config-if)# no shutdown |
Brings up the interface. |
Configuring NPV Traffic Management
An NPV traffic map associates one or more NP uplink interfaces with a server interface. The switch associates the server interface with one of these NP uplinks.
Note |
To map the server interface to a different uplink, the server interface must be shut down before configuring the traffic map. |
To configure a traffic map, perform this task:
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
switch# configure terminal |
Enters global configuration mode. |
||
Step 2 |
switch(config)# npv traffic-map server-interface {fc slot/port | vfc vfc-id} external-interface { fc slot/port | san-port-channel <number> | vfc vfc-id | vfc-port-channel vfc-port-channel-id } |
Configures a mapping between a server interface (or range of server interfaces) and an NP uplink interface (or range of NP uplink interfaces).
|
||
Step 3 |
switch(config)# no npv traffic-map server-interface {fc slot/port | vfc vfc-id} external-interface { fc slot/port | san-port-channel <number> | vfc vfc-id | vfc-port-channel vfc-port-channel-id } |
Removes the mapping between the specified server interfaces and NP uplink interfaces. |
If you configure additional NP uplinks, you can enable the disruptive load-balancing feature to distribute the server traffic load evenly among all the NP uplinks.
To enable disruptive load balancing, perform this task:
Command or Action | Purpose | |
---|---|---|
Step 1 |
switch# configure terminal |
Enters configuration mode on the NPV. |
Step 2 |
switch(config)# npv auto-load-balance disruptive |
Enables disruptive load balancing on the switch. |
Step 3 |
switch (config)# no npv auto-load-balance disruptive |
Disables disruptive load balancing on the switch. |
To display information about FC NPV, perform the following task:
Command or Action | Purpose | |
---|---|---|
Step 1 |
switch# show feature-set | i fcoe Example:
|
|
Step 2 |
switch# show npv flogi-table [all] |
Displays the FC NPV configuration. |
To display a list of devices on a server interface and their assigned NP uplinks, enter the show npv flogi-table command on the Cisco Nexus 9000 Series switch:
switch# show npv flogi-table
--------------------------------------------------------------------------------
SERVER EXTERNAL
INTERFACE VSAN FCID PORT NAME NODE NAME INTERFACE
---------------------------------------------------------------------------------
vfc1/x 1 0xee0008 10:00:00:00:c9:60:e4:9a 20:00:00:00:c9:60:e4:9a fc1/x
vfc1/x 1 0xee0009 20:00:00:00:0a:00:00:01 20:00:00:00:c9:60:e4:9a fc1/x
vfc1/x 1 0xee000a 20:00:00:00:0a:00:00:02 20:00:00:00:c9:60:e4:9a fc1/x
vfc1/x 1 0xee000b 33:33:33:33:33:33:33:33 20:00:00:00:c9:60:e4:9a fc1/x
Total number of flogi = 4
Note |
For each server interface, the External Interface value displays the assigned NP uplink. |
To display the status of the server interfaces and the NP uplink interfaces, enter the show npv status command:
switch# show npv status
npiv is enabled
disruptive load balancing is disabled
External Interfaces:
====================
Interface: fc1/47, State: Down
Interface: san-port-channel 200, State: Trunking
VSAN: 1, State: Up
VSAN: 200, State: Up
VSAN: 201, State: Up
VSAN: 202, State: Up, FCID: 0xea0020
VSAN: 100, State: Up
VSAN: 55, State: Up
Interface: vfc-po149, State: Trunking
VSAN: 201, State: Up
VSAN: 202, State: Up, FCID: 0xea0260
VSAN: 100, State: Up
Interface: vfc-po4090, State: Trunking
VSAN: 201, State: Up
VSAN: 202, State: Up, FCID: 0xea0220
VSAN: 100, State: Up
Interface: vfc1/9, State: Trunking
VSAN: 201, State: Up
VSAN: 202, State: Up, FCID: 0xea0240
VSAN: 100, State: Up
Number of External Interfaces: 5
Server Interfaces:
==================
Interface: fc1/38, VSAN: 100, State: Up
Interface: fc1/39, VSAN: 202, State: Up
Interface: fc1/40, VSAN: 4094, State: Down
Interface: vfc100, VSAN: 4094, State: Down
Interface: vfc151, VSAN: 4094, State: Down
Interface: vfc1/14, VSAN: 100, State: Up
Number of Server Interfaces: 6
Note |
To view fcns database entries for FC NPV edge switches, you must enter the show fcns database command on the core switch. |
To view all the FC NPV edge switches, enter the show fcns database command on the core switch:
core-switch# show fcns database
For additional details (such as IP addresses, switch names, interface names) about the FC NPV edge switches that you see in the show fcns database output, enter the show fcns database detail command on the core switch:
core-switch# show fcns database detail
======================================================================
------------------------
VSAN:100 FCID:0xe101c0
------------------------
port-wwn (vendor) :50:0a:09:82:ad:0d:86:37 (NetApp)
node-wwn :50:0a:09:80:8d:0d:86:37
class :3
node-ip-addr :0.0.0.0
ipa :00 00 00 00 1e 22 a0 00
fc4-types:fc4_features :scsi-fcp:target
symbolic-port-name :NetApp FC Target Adapter (8112) lab-D-netapp01:3b
symbolic-node-name :NetApp FAS3240 (lab-D-netapp01)
port-type :N
port-ip-addr :0.0.0.0
fabric-port-wwn :21:61:00:2a:6a:5b:da:00
hard-addr :0x000000
permanent-port-wwn (vendor) :50:0a:09:82:ad:0d:86:37 (NetApp)
connected interface :vfc6/33
switch name (IP address) :MDS9706 (10.105.188.173)
------------------------
VSAN:100 FCID:0xe101ef
------------------------
port-wwn (vendor) :50:06:01:6b:08:60:7c:71 (Clariion)
node-wwn :50:06:01:60:88:60:7c:71
class :3
node-ip-addr :0.0.0.0
ipa :ff ff ff ff ff ff ff ff
fc4-types:fc4_features :scsi-fcp:both
symbolic-port-name :CLARiiON::::SPB23::FC::::::
symbolic-node-name :CLARiiON::::SPB::FC::::::
port-type :N
port-ip-addr :0.0.0.0
fabric-port-wwn :20:19:00:2a:6a:5b:da:00
hard-addr :0x000000
permanent-port-wwn (vendor) :50:06:01:6b:08:60:7c:71 (Clariion)
connected interface :fc1/25
switch name (IP address) :MDS9706 (10.105.188.173)
core-switch# show interface fc 1/1
fc1/1 is trunking
Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN)
Port WWN is 20:01:2c:d0:2d:50:d2:a0
Admin port mode is NP, trunk mode is on
snmp link state traps are enabled
Port mode is TNP
Port vsan is 201
Speed is 16 Gbps
Transmit B2B Credit is 500
Receive B2B Credit is 64
Receive data field Size is 2112
Beacon is turned off
Belongs to san-port-channel 200
Trunk vsans (admin allowed and active) (1,55,100,200-202,204)
Trunk vsans (up) (100,202)
Trunk vsans (isolated) (204)
Trunk vsans (initializing) (1,55,200-201)
5 minutes input rate 0 bits/sec,0 bytes/sec, 0 frames/sec
5 minutes output rate 0 bits/sec,0 bytes/sec, 0 frames/sec
406 frames input,40164 bytes
0 discards,0 errors
0 invalid CRC/FCS,0 unknown class
0 too long,0 too short
192 frames output,14364 bytes
0 discards,0 errors
1 input OLS,1 LRR,5 NOS,0 loop inits
3 output OLS,1 LRR, 4 NOS, 0 loop inits
500 transmit B2B credit remaining
0 low priority transmit B2B credit remaining
Last clearing of "show interface" counters :never
To display the FC NPV traffic map, enter the show npv traffic-map command.
switch# show npv traffic-map
NPV Traffic Map Information:
----------------------------------------
Server-If External-If(s)
----------------------------------------
fc1/3 fc1/10,fc1/11
fc1/5 fc1/1,fc1/2
----------------------------------------
To display the FC NPV internal traffic details, enter the show npv internal info traffic-map command.
To display the disruptive load-balancing status, enter the show npv status command:
switch# show npv status
npiv is enabled
disruptive load balancing is enabled
External Interfaces:
====================
Interface: fc1/1, VSAN: 2, FCID: 0x1c0000, State: Up
...
This section demonstrates how to configure FC NPV core and edge switches.
Step 1 |
Procure and install the SAN_ENTERPRISE_PKG and PORT_ACTIVATION_PKG licenses.
|
||
Step 2 |
Check out the license:
|
||
Step 3 |
Configure the needed features on the NPV:
|
||
Step 4 |
Convert the FC port:
|
||
Step 5 |
Configure service policies:
|
||
Step 6 |
Configure TCAM carving:
|
||
Step 7 |
Copy the running configuration to startup:
|
||
Step 8 |
(Mandatory) Reload the switch so that the port conversion is applied and TCAMS are carved properly:
|
||
Step 9 |
Configure VLAN-VSAN mappings:
|
||
Step 10 |
Configure the port license for FC ports:
|
||
Step 11 |
Configure the FC NP interface-facing core (this same configuration must be applied on the core switch with switchport mode F or auto for the FC interface):
|
||
Step 12 |
Configure the virtual FC NP interface-facing core (this same configuration must be applied on the core switch with switchport mode F or auto for the virtual FC interface): |
||
Step 13 |
Configure the SAN port channel interface-facing core (This same configuration must be applied on the core switch with switchport mode F or auto for the port-channel interface. The SAN port-channel number can be different.): |
||
Step 14 |
Configure the vFC port channel interface-facing core (This same configuration must be applied on the core switch with switchport mode F or auto for the virtual FC port-channel interface. The vFC port-channel number can be different): |
||
Step 15 |
Configure the FCoE server interface-facing server: |
||
Step 16 |
Configuring FC server interface |