Cisco MDS 9000 Family CLI Configuration Guide, Release 3.3(3)
Configuring FlexAttach Virtual pWWN

Table Of Contents

Configuring FlexAttach Virtual pWWN

About FlexAttach Virtual pWWN

FlexAttach Virtual pWWN Guidelines and Requirements

Configuring FlexAttach Virtual pWWN

Enabling FlexAttach Virtual pWWN

The FlexAttach virtual pWWN feature is enabled automatically, manually, or by mapping pWWN to virtual pWWN. Automatically Enabling FlexAttach Virtual pWWN

Manually Enabling FlexAttach Virtual pWWN

Mapping pWWN to Virtual pWWN

Verifying FlexAttach Virtual pWWN`

Verifying The End Device

Debugging FlexAttach Virtual pWWN

Security Settings for FlexAttach Virtual pWWN

FlexAttach Virtual pWWN CFS Distribution

Difference Between San Device Virtualization and FlexAttach Port Virtualization


Configuring FlexAttach Virtual pWWN


This chapter describes the FlexAttach virtual port world-wide name (pWWN) feature and includes the following sections:

About FlexAttach Virtual pWWN

FlexAttach Virtual pWWN Guidelines and Requirements

Configuring FlexAttach Virtual pWWN

Difference Between San Device Virtualization and FlexAttach Port Virtualization

About FlexAttach Virtual pWWN

FlexAttach virtual pWWN feature facilitates server and configuration management. In a SAN environment, the server installation or replacement, requires interaction and coordination among the SAN and server administrators. For coordination, it is important that the SAN configuration does not change when a new server is installed, or when an existing server is replaced. FlexAttach virtual pWWN minimizes the interaction between the server administrator and the SAN administrator by abstracting the real pWWN using virtual pWWNs.

When FlexAttach virtual pWWN is enabled on an interface, a virtual pWWN is assigned to the server interface. The real pWWN is replaced by a virtual pWWN, which is used for SAN configuration like zoning.

Administrators can benefit from FlexAttach in the following scenarios:

Pre-configure : Pre-configure SAN for new servers which are not physical there yet--may be onorder. FlexAttach can be enabled on the ports designated for the new servers and use the virtual WWNs assigned for configuring SAN. The new servers are then plugged into the fabric without any change needed in the SAN.

Replacement to the same port : A failed server can be replaced onto the same port without changing the SAN. The new server gets a same pWWN as the failed server because the virtual pWWN is assigned to the port.

Replacement to (spare)— A spare server--which is on the same NPV device or a different NPV device) can be brought online without changes to the SAN. This is achieved by moving the virtual port WWN from the current server port to the spare port.

Server Mobility - A server can be moved to another port on the same NPV device or another NPV device without changing the SAN. This is accomplished by moving the virtual pWWN to the new port. No change is needed if FlexAttach was configured using physical port WWN of the server to the virtual port WWN mapping.

FlexAttach Virtual pWWN Guidelines and Requirements

Following are recommended guidelines and requirements when deploying FlexAttach virtual pWWN:

FlexAttach configuration is supported only on NPV switches.

Cisco Fabric Services (CFS) IP version 4 (IPv4) distribution should be enabled.

Virtual WWNs should be unique across the fabric.

Configuring FlexAttach Virtual pWWN

This section describes how to configure FlexAttach virtual pWWN feature and includes the following topics:

Enabling FlexAttach Virtual pWWN

Verifying FlexAttach Virtual pWWN`

Security Settings for FlexAttach Virtual pWWN

FlexAttach Virtual pWWN CFS Distribution

Verifying The End Device, page 14-9

Debugging FlexAttach Virtual pWWN, page 14-9

Enabling FlexAttach Virtual pWWN

The FlexAttach virtual pWWN feature is enabled automatically, manually, or by mapping pWWN to virtual pWWN. Automatically Enabling FlexAttach Virtual pWWN

The virtual pWWN is enabled automatically on all the NPV switches, or per port on the NPV box. When enabled automatically, a virtual WWN is generated from the device switch WWN. This WWN is used as the virtual pWWN. Virtual pWWNs are generated using the local switch WWNs.


Note The port must be in a shut state when the virtual pWWN is enabled.


Step 1

To enable virtual pWWN automatically, perform this task:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch# (config)# flex-attach virtual-pwwn auto [interface interface-list]

Enables FlexAttach virtual pWWN automatically on the switch.

Step 3 

switch# (config)# flex-attach 
commit

Commits the enabled FlexAttach virtual pWWN.


NoteWhen the interface-list is not included in the command, virtual pWWN is enabled globally.

All the interfaces mentioned in the interface-list must be in a shut state.


Manually Enabling FlexAttach Virtual pWWN

You can manually assign a WWN to the interface, without generating it through the switch. Several checks are done by the NPV core to ensure the uniqueness of virtual pWWNs in the switch. When duplicate virtual pWWNs are configured, the subsequent logins are rejected by the NPV core switch.


NoteSome ports may be in automode, some in manual mode, and the virtual pWWNs need not be assigned.

The port must be in a shut state when virtual pWWN is enabled.



Note The interface mentioned in the interface value must be in a shut state.


To enable virtual pWWN manually, perform this task:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch# (config)# flex-attach virtual-pwwn vpwwn interface interface

Enables FlexAttach virtual pWWN on the switch by allowing the administrator to specify the interface.

Step 3 

switch# (config)# flex-attach 
commit

Commits the enabled FlexAttach virtual pWWN.


Note The interface mentioned in the interface value must be in a shut state.


Mapping pWWN to Virtual pWWN

You can configure virtual pWWNs through real pWWNs. This is required for NPIV hosts containing multiple pWWNs, of which only FLOGI is mapped to the virtual pWWN. Subsequent FDSIDs will have different mappings.

Several checks are done by the NPV core to ensure the uniqueness of virtual pWWNs in the switch across the NPV switches. When duplicate virtual pWWNs are configured, the subsequent logins are rejected by the NPV core switch.


Note The interface must be in a shut state and the specified Virtual pWWN should not be logged in.


To map pWWN to virtual pWWN, perform this task:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch# (config)# flex-attach virtual-pwwn vpwwn interface interface

Reassigns the pWWN on the switch as the virtual pWWN.

Step 3 

switch# (config)# flex-attach 
commit

Commits the enabled FlexAttach virtual pWWN.


Note The specified virtual pWWN and the real pWWN must not be logged in.


Verifying FlexAttach Virtual pWWN`

To view and confirm that the type and value of virtual pWWNs are correct, enter the show flex-attach virtual-wwn command. (See Example 6-1.)

Example 6-1 Displaying the Type and Value of Virtual pWWNs

switch# show flex-attach virtual-wwn
VIRTUAL PORT WWNS ASSIGNED TO INTERFACES
----------------------------------------------------------------------
VSAN     INTERFACE  VIRTUAL-PWWN              AUTO    LAST-CHANGE
----------------------------------------------------------------------
1        fc1/1      00:00:00:00:00:00:00:00
1        fc1/2      22:73:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008
1        fc1/3      22:5e:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008
1        fc1/4      22:5f:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008
1        fc1/5      22:74:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:26:24 2008
1        fc1/6      22:60:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008
1        fc1/7      22:61:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008
1        fc1/8      22:62:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008
1        fc1/9      22:63:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008
1        fc1/10     22:64:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008
1        fc1/11     22:65:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008
1         fc1/12     22:66:00:05:30:01:6e:1e   TRUE   Thu Jan 31 01:58:52 2008

Verifying The End Device

To verify that the end device is logged with the correct virtual WWNs, use the show fcns database command on the NPV core. (See Example 6-2.)

Example 6-2 Verifying the End Device

switch# show fcns database
VSAN 1:
--------------------------------------------------------------------------
FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE
--------------------------------------------------------------------------
0x010000 N 20:01:00:0d:ec:2f:c1:40 (Cisco) npv
0x010001 N 20:02:00:0d:ec:2f:c1:40 (Cisco) npv
0x010200 N 21:00:00:e0:8b:83:01:a1 (Qlogic) scsi-fcp:init
0x010300 N 21:01:00:e0:8b:32:1a:8b (Qlogic) scsi-fcp:init

Total number of entries = 4

Debugging FlexAttach Virtual pWWN

For specific problems and the workarounds, refer to the following real-time scenarios:

Table 6-1 FlexAttach Errors and the Workaround

Error
Description
Workaround

fc1/1 : interface is not down

FlexAttach configuration fails with this error as the configuration is enabled for an active interface with the operation state as up.

To move the port to the shut state, enable the FlexAttach configuration and then move the port to no shut state.

FlexAttach configuration is not distributed to the peers

This occurs when the FlexAttach configuration on one peer NPV is not available to any other peer NPV.

FlexAttach configuration will not be distributed if cfs ipv4 distribute, or cfs ipv6 distribute is disabled. Enable cfs ipv4 distribute, or cfs ipv6 distribute.

Even with CFS distribution enabledm Inagua doesn't become peer with other NPVs

This occurs whenCFS over IP is enabled, and when the Inagua in one blade center is not the peer NPV for other NPVs.

CFS over IP uses IP multicast to discover the NPV peers in the network. IBM MM does not support multicast and cannot act as a peer with NPV. This prevents the FlexAttach configuration from getting disrtibuted to other peer NPVs in the network.

NP port uses physical pWWN instead of virtual pWWN confgured through FlexAttach

This occurs whenNP port uses physical pWWN instead of virtual pWWN, that is configured through FlexAttach.

FlexAttach is supported on server interfaces like F ports, and not on external interfaces like NP port.

real port WWN and virtual WWN cannot be same

This occurs when you try to configure FlexAttach with a similar value for pWWN and virtual pWWN.

Use different values for pWWN and virtual pWWN, as similar values for pWWN and virtual pWWn are not allowed.

Virtual port WWN already exists

This occurs when you try to configure an already defined pWWN to a different interface.

Use undefined virtual pWWN for a new interface.


Security Settings for FlexAttach Virtual pWWN

Security settings for FlexAttach virtual pWWN feature are done by port security at the NPV core. Node WWN of the end device is used to provide physical security.

For more details on enabling port security, see Chapter 39, "Configuring Port Security".

FlexAttach Virtual pWWN CFS Distribution

FlexAttach virtual pWWN configuration is distributed for CFS through IPv4, and is enabled by default. The FlexAttach virtual pWWN distribution, by default, is on CFS region 201. The CFS region 201 links only to the NPV enabled switches. Other CFS feature like syslog is on region 0. Region 0 will be linked through IPv4 for all NPV switches on the same physical fabric. If CFS has an option to link through IPv4 or ISL, then CFS will select the ISL path.


Note NPV switches do not have ISL (E or TE ports) and are linked through IPv4.


Difference Between San Device Virtualization and FlexAttach Port Virtualization

Figure 6-1 describes the difference between SAN Device Virtualization (SDV) and FlexAttach Port Virtualization.

Figure 6-1 Difference Between SDV and FlexAttach Virtualization

FlexAttach Virtualization
SDV

Facilitates server management and has no restriction on the end devices used.

Facilitates target and disk management, and only facilitates disk and data migration.

WWN and Network Address Transport (NAT) is allocated to host bus adapter (HBA)

WWN NAT and Fibre Channel ID (FC-ID) are allocated on the virtual device, both primary and secondary

No rewrite requirements.

FC-ID rewrite on the switch indicates a rewrite-capable switch on the path.

Configuration distribution is not required for any of the interface-based configurations.

Configuration is distributed. This allows programming rewrites and connectivity anywhere.

Does not require device alias for virtual pWWN.

Configuration is secured to device alias.

Allows automapping to the new HBA. Mapping process is manual for NPIV.

Does not allow automapping to the secondary device