Configuring FlexAttach Virtual pWWN

Information About FlexAttach Virtual pWWN

This section includes the following topics:

FlexAttach Virtual pWWN

FlexAttach virtual pWWN feature facilitates server and configuration management. In a SAN environment, the server installation or replacement, requires interaction and coordination among the SAN and server administrators. For coordination, it is important that the SAN configuration does not change when a new server is installed, or when an existing server is replaced. FlexAttach virtual pWWN minimizes the interaction between the server administrator and the SAN administrator by abstracting the real pWWN using virtual pWWNs.

When FlexAttach virtual pWWN is enabled on an interface, a virtual pWWN is assigned to the server interface. The real pWWN is replaced by a virtual pWWN, which is used for a SAN configuration such as zoning.

Server administrators can benefit from FlexAttach in the following scenarios:

  • Pre-configure—Pre-configure SAN for new servers that are not available physically yet. For example, they may be on order. FlexAttach can be enabled on the ports designated for the new servers and use the virtual WWNs assigned for configuring SAN. The new servers are then plugged into the fabric without any change needed in the SAN.
  • Replacement to the same port—A failed server can be replaced onto the same port without changing the SAN. The new server gets a same pWWN as the failed server because the virtual pWWN is assigned to the port.
  • Replacement to (spare)—A spare server, which is on the same NPV device or a different NPV device) can be brought online without changes to the SAN. This action is achieved by moving the virtual port WWN from the current server port to the spare port.
  • Server Mobility—A server can be moved to another port on the same NPV device or another NPV device without changing the SAN. This is accomplished by moving the virtual pWWN to the new port. No change is needed if FlexAttach was configured using the physical port WWN of the server to the virtual port WWN mapping.

Difference Between San Device Virtualization and FlexAttach Port Virtualization

Table 8-1 describes the difference between SAN device virtualization (SDV) and FlexAttach port virtualization.

Table 8-1 Difference Between SDV and FlexAttach Virtualization

 

SAN Device Virtualization (SDV)
FlexAttach Virtualization

Facilitates target and disk management, and only facilitates disk and data migration.

Facilitates server management and has no restriction on the end devices used.

WWN NAT and Fibre Channel ID (FC-ID) are allocated on the virtual device, both primary and secondary.

WWN and Network Address Transport (NAT) is allocated to host bus adapter (HBA).

FC-ID rewrite on the switch indicates a rewrite-capable switch on the path.

No rewrite requirements.

Configuration is distributed. This allows programming rewrites and connectivity anywhere.

Configuration distribution is not required for any of the interface-based configurations.

Configuration is secured to device alias.

Does not require device alias for virtual pWWN.

Does not allow automapping to the secondary device.

Allows automapping to the new HBA. Mapping process is manual for NPIV.

FlexAttach Virtual pWWN CFS Distribution

The FlexAttach virtual pWWN configuration is distributed for CFS through IPv4, and is enabled by default. The FlexAttach virtual pWWN distribution, by default, is on CFS region 201. The CFS region 201 links only to the NPV-enabled switches. Other CFS features such as syslog is on region 0. Region 0 will be linked through IPv4 for all NPV switches on the same physical fabric. If CFS has an option to link through IPv4 or ISL, then CFS will select the ISL path.

note.gif

Noteblank.gif NPV switches do not have ISL (E or TE ports) and are linked through IPv4.


Security Settings for FlexAttach Virtual pWWN

Security settings for the FlexAttach virtual pWWN feature are done by port security at the NPV core. Node WWN of the end device is used to provide physical security.

For more details on enabling port security, refer to the Cisco MDS 9000 Series NX-OS Security Configuration Guide.

Guidelines and Limitations

Following are recommended guidelines and requirements when deploying FlexAttach virtual pWWN:

  • FlexAttach configuration is supported only on NPV switches.
  • Cisco Fabric Services (CFS) IP version 4 (IPv4) distribution should be enabled.
  • Virtual WWNs should be unique across the fabric.

Configuring FlexAttach Virtual pWWN

This section includes the following topics:

Automatically Assigning FlexAttach Virtual pWWN

Automatic assignment of virtual pWWN can be configured on an NPV switch globally, per VSAN, or per port. When assigned automatically, a virtual WWN is generated from the device local switch WWN.

Prerequisites

The port must be in a shut state when the virtual pWWN is enabled.

Detailed Steps

To assign a virtual pWWN automatically, perform this task:

 

Command
Purpose

Step 1

switch# config t

Enters configuration mode.

Step 2

switch# (config)# flex-attach virtual-pwwn auto [ interface interface-list ]

Assigns FlexAttach virtual pWWN automatically for the interfaces.

switch# (config)# flex-attach virtual-pwwn auto [ vsan vsan-range ]

Assigns FlexAttach virtual pWWN automatically for the VSANs.

Step 3

switch# (config)# flex-attach commit

Commits the configuration.

Troubleshooting Tips

  • When the interface-list value is not included in the command, virtual pWWN is assigned globally.
  • All the interfaces mentioned in the interface-list value must be in a shut state.

Manually Assigning FlexAttach Virtual pWWN

You can manually assign a WWN to the interface, without generating it through the switch. Several checks are done by the NPV core to ensure the uniqueness of virtual pWWNs in the switch. When duplicate virtual pWWNs are configured, the subsequent logins are rejected by the NPV core switch.

Prerequisites

  • Some ports may be in automode, some in manual mode, and the virtual pWWNs need not be assigned.
  • The port must be in a shut state when a virtual pWWN is assigned.

Restrictions

  • The interface mentioned in the interface value must be in a shut state.

Detailed Steps

To assign virtual pWWN manually, perform this task:

 

Command
Purpose

Step 1

switch# config t

Enters configuration mode.

Step 2

switch# (config)# flex-attach virtual-pwwn vpwwn interface interface

Configures the FlexAttach virtual pWWN for the interface.

switch# (config)# flex-attach virtual-pwwn vpwwn interface interface [ vsan vsan]

Configures the FlexAttach virtual pWWN for the interface in the VSAN.

Step 3

switch# (config)# flex-attach commit

Commits the configuration.

Mapping pWWN to Virtual pWWN

You can configure virtual pWWNs through real pWWNs. This process is required for NPIV hosts containing multiple pWWNs, of which only FLOGI is mapped to the virtual pWWN. Subsequent FDSIDs will have different mappings.

Several checks are done by the NPV core to ensure the uniqueness of virtual pWWNs in the switch across the NPV switches. When duplicate virtual pWWNs are configured, the subsequent logins are rejected by the NPV core switch.

Prerequisites

  • The interface must be in a shut state and the specified virtual pWWN should not be logged in.

Restrictions

  • The specified virtual pWWN and the real pWWN must not be logged in.

Detailed Steps

To map pWWN to virtual pWWN, perform this task:

 

Command
Purpose

Step 1

switch# config t

Enters configuration mode.

Step 2

switch# (config)# flex-attach virtual-pwwn vpwwn pwwn pwwn

Maps the pWWN to the virtual pWWN.

Step 3

switch# (config)# flex-attach commit

Commits the configuration.

Verifying FlexAttach Virtual pWWN Configuration

To display FlexAttach configuration information, perform one of the following tasks:

 

Command
Purpose

show flex-attach virtual-pwwn

Displays the type and value of virtual pWWNs.

show fcns database

Displays if the end device is logged with the correct virtual WWNs.

For detailed information about the fields in the output from these commands, refer to the Cisco MDS NX-OS Command Reference.

To view and confirm that the type and value of virtual pWWNs are correct, enter the show flex-attach virtual-pwwn command. (See Example 8-1.)

Example 8-1 Displaying the Type and Value of Virtual pWWNs

switch# show flex-attach virtual-pwwn
VIRTUAL PORT WWNS ASSIGNED TO INTERFACES
----------------------------------------------------------------------
VSAN INTERFACE VIRTUAL-PWWN AUTO LAST-CHANGE
----------------------------------------------------------------------
1 fc1/1 00:00:00:00:00:00:00:00
1 fc1/2 22:73:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008
1 fc1/3 22:5e:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008
1 fc1/4 22:5f:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008
1 fc1/5 22:74:00:05:30:01:6e:1e TRUE Thu Jan 31 01:26:24 2008
1 fc1/6 22:60:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008
1 fc1/7 22:61:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008
1 fc1/8 22:62:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008
1 fc1/9 22:63:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008
1 fc1/10 22:64:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008
1 fc1/11 22:65:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008
1 fc1/12 22:66:00:05:30:01:6e:1e TRUE Thu Jan 31 01:58:52 2008

Verifying the End Device

To verify that the end device is logged with the correct virtual WWNs, use the show fcns database command on the NPV core. (See Example 8-2.)

Example 8-2 Verifying the End Device

switch# show fcns database
VSAN 1:
--------------------------------------------------------------------------
FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE
--------------------------------------------------------------------------
0x010000 N 20:01:00:0d:ec:2f:c1:40 (Cisco) npv
0x010001 N 20:02:00:0d:ec:2f:c1:40 (Cisco) npv
0x010200 N 21:00:00:e0:8b:83:01:a1 (Qlogic) scsi-fcp:init
0x010300 N 21:01:00:e0:8b:32:1a:8b (Qlogic) scsi-fcp:init

Total number of entries = 4

Monitoring FlexAttach Virtual pWWN

Table 8-2 lists the errors that might be displayed and provides the workarounds.

Table 8-2 FlexAttach Errors and Workarounds

Error
Description
Workaround

fc1/1 : interface is not down

FlexAttach configuration fails because the configuration is enabled for an active interface with the operation state as up.

To move the port to the shut state, enable the FlexAttach configuration, and then move the port to no shut state.

FlexAttach configuration is not distributed to the peers

The FlexAttach configuration on one peer NPV is not available to any other peer NPV.

FlexAttach configuration will not be distributed if cfs ipv4 distribute, or cfs ipv6 distribute is disabled. Enable cfs ipv4 distribute, or cfs ipv6 distribute.

Even with CFS distribution enabled Inagua does not become a peer with other NPVs

CFS over IP is enabled, and the Inagua in one blade center is not the peer NPV for other NPVs.

CFS over IP uses IP multicast to discover the NPV peers in the network. IBM MM does not support multicast and cannot act as a peer with NPV. This prevents the FlexAttach configuration from getting distributed to other peer NPVs in the network.

NP port uses physical pWWN instead of virtual pWWN configured through FlexAttach

This occurs when NP port uses physical pWWN instead of virtual pWWN, that is configured through FlexAttach.

FlexAttach is supported on server interfaces such as F ports, and not on external interfaces such as NP ports.

real port WWN and virtual WWN cannot be same

This occurs when you try to configure FlexAttach with a similar value for pWWN and virtual pWWN.

Use different values for pWWN and virtual pWWN, as similar values for pWWN and virtual pWWn are not allowed.

Virtual port WWN already exists

This occurs when you try to configure an already defined pWWN to a different interface.

Use an undefined virtual pWWN for a new interface.