Information About Zoning
Zoning has the following features:
- A zone consists of multiple zone members.
– Members in a zone can access each other; members in different zones cannot access each other.
– If zoning is not activated, all devices are members of the default zone.
– If zoning is activated, any device that is not in an active zone (a zone that is part of an active zone set) is a member of the default zone.
– Zones can vary in size.
– Devices can belong to more than one zone.
– A physical fabric can have a maximum of 16,000 members. This includes all VSANs in the fabric.
- A zone set consists of one or more zones.
– A zone set can be activated or deactivated as a single entity across all switches in the fabric.
– Only one zone set can be activated at any time.
– A zone can be a member of more than one zone set.
– A zone switch can have a maximum of 500 zone sets.
- Zoning can be administered from any switch in the fabric.
– When you activate a zone (from any switch), all switches in the fabric receive the active zone set. Additionally, full zone sets are distributed to all switches in the fabric, if this feature is enabled in the source switch.
– If a new switch is added to an existing fabric, zone sets are acquired by the new switch.
- Zone changes can be configured non-disruptively. New zones and zone sets can be activated without interrupting traffic on unaffected ports or devices.
- Zone membership criteria is based mainly on WWNs or FC IDs.
– Port world wide name (pWWN)—Specifies the pWWN of an N port attached to the switch as a member of the zone.
– Fabric pWWN—Specifies the WWN of the fabric port (switch port’s WWN). This membership is also referred to as port-based zoning.
– FC ID—Specifies the FC ID of an N port attached to the switch as a member of the zone.
– Interface and switch WWN (sWWN)—Specifies the interface of a switch identified by the sWWN. This membership is also referred to as interface-based zoning.
– Interface and domain ID—Specifies the interface of a switch identified by the domain ID.
– Domain ID and port number—Specifies the domain ID of an MDS domain and additionally specifies a port belonging to a non-Cisco switch.
– IPv4 address—Specifies the IPv4 address (and optionally the subnet mask) of an attached device.
– IPv6 address—The IPv6 address of an attached device in 128 bits in colon(:)-separated hexadecimal format.
- Default zone membership includes all ports or WWNs that do not have a specific membership association. Access between default zone members is controlled by the default zone policy.
- You can configure up to 8000 zones per VSAN and a maximum of 8000 zones for all VSANs on the switch.
This section includes the following topics:
Zone Implementation
All switches in the Cisco MDS 9000 Family automatically support the following basic zone features (no additional configuration is required):
- Zones are contained in a VSAN.
- Hard zoning cannot be disabled.
- Name server queries are soft-zoned.
- Only active zone sets are distributed.
- Unzoned devices cannot access each other.
- A zone or zone set with the same name can exist in each VSAN.
- Each VSAN has a full database and an active database.
- Active zone sets cannot be changed, without activating a full zone database.
- Active zone sets are preserved across switch reboots.
- Changes to the full database must be explicitly saved.
- Zone reactivation (a zone set is active and you activate another zone set) does not disrupt existing traffic.
If required, you can additionally configure the following zone features:
- Propagate full zone sets to all switches on a per VSAN basis.
- Change the default policy for unzoned members.
- Interoperate with other vendors by configuring a VSAN in the interop mode. You can also configure one VSAN in the interop mode and another VSAN in the basic mode in the same switch without disrupting each other.
- Bring E ports out of isolation.
About the Edit Local Full Zone Database Tool
You can use the Edit Full Zone Database Tool to complete the following tasks:
- You can display information by VSAN by using the pull-down menu without having to get out of the screen, selecting a VSAN, and re-entering.
- You can use the Add to zone or alias button to move devices up or down by alias or by zone.
- You can add zoning characteristics based on alias in different folders.
- You can triple-click to rename zone sets, zones, or aliases in the tree.
The Edit Local Full Zone Database tool allows you to zone across multiple switches and all zoning features are available through the Edit Local Full Zone Database dialog box (see Figure 7-1).
Figure 7-1 Edit Local Full Zone Database Dialog Box
|
You can display information by VSAN by using the drop-down menu without closing the dialog box, selecting a VSAN, and re-entering. |
|
You can add zoning characteristics based on alias in different folders. |
|
You can use the Add to zone button to move devices up or down by alias or by zone. |
|
You can triple-click to rename zone sets, zones, or aliases in the tree. |
Note The Device Alias radio button is visible only if device alias is in enhanced mode. For more information, see “Creating Device Aliases” section.
About Zone Sets
Zones provide a method for specifying access control. Zone sets are a grouping of zones to enforce access control in the fabric.
Zone sets are configured with the names of the member zones and the VSAN (if the zone set is in a configured VSAN).
Zone Set Distribution —You can distribute full zone sets using one of two methods: one-time distribution or full zone set distribution.
Zone Set Duplication —You can make a copy of a zone set and then edit it without altering the original zone set. You can copy an active zone set from the bootflash: directory, volatile: directory, or slot0, to one of the following areas:
- To the full zone set
- To a remote location (using FTP, SCP, SFTP, or TFTP)
The active zone set is not part of the full zone set. You cannot make changes to an existing zone set and activate it, if the full zone set is lost or is not propagated.
About Zone Set Creation
In Figure 7-2, two separate sets are created, each with its own membership hierarchy and zone members.
Figure 7-2 Hierarchy of Zone Sets, Zones, and Zone Members
Either zone set A or zone set B can be activated (but not together).
Tip Zone sets are configured with the names of the member zones and the VSAN (if the zone set is in a configured VSAN).
About the Default Zone
Each member of a fabric (in effect a device attached to an Nx port) can belong to any zone. If a member is not part of any active zone, it is considered to be part of the default zone. Therefore, if no zone set is active in the fabric, all devices are considered to be in the default zone. Even though a member can belong to multiple zones, a member that is part of the default zone cannot be part of any other zone. The switch determines whether a port is a member of the default zone when the attached port comes up.
Note Unlike configured zones, default zone information is not distributed to the other switches in the fabric.
Traffic can either be permitted or denied among members of the default zone. This information is not distributed to all switches; it must be configured in each switch.
Note When the switch is initialized for the first time, no zones are configured and all members are considered to be part of the default zone. Members are not permitted to talk to each other.
Configure the default zone policy on each switch in the fabric. If you change the default zone policy on one switch in a fabric, be sure to change it on all the other switches in the fabric.
Note The default settings for default zone configurations can be changed.
The default zone members are explicitly listed when the default policy is configured as permit or when a zone set is active. When the default policy is configured as deny, the members of this zone are not explicitly enumerated when you issue the show zoneset active command view the active zone set.
Note The current default zoning policy in both the switches is deny. In the Cisco MDS 9222i Switch, the active zone set is coco_isola_zoneset. In the Cisco MDS 9513 Switch, there is no active zone set. However, because the default zoning policy is deny, the hidden active zone set is d__efault__cfg which causes zone merge to fail. The behavior is same between two Brocade switches.
You can change the default zone policy for any VSAN by choosing VSANxx > Default Zone from the DCNM-SAN menu tree and clicking the Policies tab. It is recommended that you establish connectivity among devices by assigning them to a nondefault zone.
About FC Alias Creation
You can assign an alias name and configure an alias member using the following values:
- pWWN—The WWN of the N or NL port is in hex format (for example, 10:00:00:23:45:67:89:ab).
- fWWN—The WWN of the fabric port name is in hex format (for example, 10:00:00:23:45:67:89:ab).
- FC ID—The N port ID is in 0xhhhhhh format (for example, 0xce00d1).
- Domain ID—The domain ID is an integer from 1 to 239. A mandatory port number of a non-Cisco switch is required to complete this membership configuration.
- IPv4 address—The IPv4 address of an attached device is in 32 bits in dotted decimal format along with an optional subnet mask. If a mask is specified, any device within the subnet becomes a member of the specified zone.
- IPv6 address—The IPv6 address of an attached device is in 128 bits in colon- (:) separated) hexadecimal format.
- Interface—Interface-based zoning is similar to port-based zoning because the switch interface is used to configure the zone. You can specify a switch interface as a zone member for both local and remote switches. To specify a remote switch, enter the remote switch WWN (sWWN) or the domain ID in the particular VSAN.
Tip The Cisco NX-OS software supports a maximum of 2048 aliases per VSAN.
Zone Enforcement
Zoning can be enforced in two ways: soft and hard. Each end device (N port or NL port) discovers other devices in the fabric by querying the name server. When a device logs in to the name server, the name server returns the list of other devices that can be accessed by the querying device. If an Nx port does not know about the FC IDs of other devices outside its zone, it cannot access those devices.
In soft zoning, zoning restrictions are applied only during interaction between the name server and the end device. If an end device somehow knows the FC ID of a device outside its zone, it can access that device.
Hard zoning is enforced by the hardware on each frame sent by an Nx port. As frames enter the switch, source-destination IDs are compared with permitted combinations to allow the frame at wirespeed. Hard zoning is applied to all forms of zoning.
Note Hard zoning enforces zoning restrictions on every frame, and prevents unauthorized access.
Switches in the Cisco MDS 9000 Family support both hard and soft zoning.
Zone Set Distribution
You can distribute full zone sets using one of two methods: one-time distribution at the EXEC mode level or full zone set distributionat the configuration mode level.
You can distribute full zone sets using one of two methods: one-time distribution or full zone set distribution.
Table 7-1 lists the differences between these distribution methods.
Table 7-1 Zone Set Distribution zoneset distribution Command Differences
zoneset distribute vsan Command
(EXEC Mode)
|
Full Zone Set Distribution
zoneset distribute full vsan Command
(Configuration Mode)
|
Distributes the full zone set immediately. |
Does not distribute the full zone set immediately. |
Does not distribute the full zone set information along with the active zone set during activation, deactivation, or merge process. |
Remembers to distribute the full zone set information along with the active zone set during activation, deactivation, and merge processes. |
About Recovering from Link Isolation
When two switches in a fabric are merged using a TE or E port, these TE and E ports may become isolated when the active zone set databases are different between the two switches or fabrics. When a TE port or an E port become isolated, you can recover that port from its isolated state using one of three options:
- Import the neighboring switch's active zone set database and replace the current active zone set (see Figure 7-3).
- Export the current database to the neighboring switch.
- Manually resolve the conflict by editing the full zone set, activating the corrected zone set, and then bringing up the link.
Figure 7-3 Importing and Exporting the Database
Zone Set Duplication
You can make a copy and then edit it without altering the existing active zone set. You can copy an active zone set from the bootflash: directory, volatile: directory, or slot0, to one of the following areas:
- To the full zone set
- To a remote location (using FTP, SCP, SFTP, or TFTP)
The active zone set is not part of the full zone set. You cannot make changes to an existing zone set and activate it, if the full zone set is lost or is not propagated.
Caution
Copying an active zone set to a full zone set may overwrite a zone with the same name, if it already exists in the full zone set database.
About Backing Up and Restoring Zones
You can back up the zone configuration to a workstation using TFTP. This zone backup file can then be used to restore the zone configuration on a switch. Restoring the zone configuration overwrites any existing zone configuration on a switch.
About Zone-Based Traffic Priority
The zoning feature provides an additional segregation method to prioritize select zones in a fabric and set up access control between devices. Using this feature, you can configure the quality of service (QoS) priority as a zone attribute. You can assign the QoS traffic priority attribute to be high, medium, or low. By default, zones with no specified priority are implicitly assigned a low priority. Refer to the Cisco MDS 9000 NX-OS Family Quality of Service Configuration Guide for more information.
This feature allows SAN administrators to configure QoS using a familiar data flow identification paradigm. You can configure this attribute on a zone-wide basis rather than between zone members.
Caution
If zone-based QoS is implemented in a switch, you cannot configure the interop mode in that VSAN.
About Broadcast Zoning
Note Broadcast zoning is not supported on the Cisco Fabric Switch for HP c-Class BladeSystem and the Cisco Fabric Switch for IBM BladeCenter.
You can configure broadcast frames in the basic zoning mode. By default, broadcast zoning is disabled and broadcast frames are sent to all Nx ports in the VSAN. When enabled, broadcast frames are only sent to Nx ports in the same zone, or zones, as the sender. Enable broadcast zoning when a host or storage device uses this feature.
Table 7-2 identifies the rules for the delivery of broadcast frames.
Table 7-2 Broadcasting Requirements
|
|
|
|
Yes |
Yes |
Yes |
Broadcast to all Nx ports that share a broadcast zone with the source of broadcast frames. |
No |
Yes |
Yes |
Broadcast to all Nx ports. |
Yes |
No |
No |
Broadcasting is disabled. |
Tip If any NL port attached to an FL port shares a broadcast zone with the source of the broadcast frame, then the frames are broadcast to all devices in the loop.
Caution
If broadcast zoning is enabled on a switch, you cannot configure the interop mode in that VSAN.
About LUN Zoning
Logical unit number (LUN) zoning is a feature specific to switches in the Cisco MDS 9000 Family.
Caution
LUN zoning can only be implemented in Cisco MDS 9000 Family switches. If LUN zoning is implemented in a switch, you cannot configure the interop mode in that switch.
A storage device can have multiple LUNs behind it. If the device port is part of a zone, a member of the zone can access any LUN in the device. With LUN zoning, you can restrict access to specific LUNs associated with a device.
Note When LUN 0 is not included within a zone, control traffic to LUN 0 (for example, REPORT_LUNS, INQUIRY) is supported, but data traffic to LUN 0 (for example, READ, WRITE) is denied.
- Host H1 can access LUN 2 in S1 and LUN 0 in S2. It cannot access any other LUNs in S1 or S2.
- Host H2 can access LUNs 1 and 3 in S1 and only LUN 1 in S2. It cannot access any other LUNs in S1 or S2.
Note Unzoned LUNs automatically become members of the default zone.
shows a LUN-based zone example.
Figure 7-4 LUN Zoning Access
About Read-Only Zones
By default, an initiator has both read and write access to the target's media when they are members of the same Fibre Channel zone. The read-only zone feature allows members to have only read access to the media within a read-only Fibre Channel zone.
You can also configure LUN zones as read-only zones. Any zone can be identified as a read-only zone. By default all zones have read-write permission unless explicitly configured as a read-only zone.
About Enhanced Zoning
Table 7-3 lists the advantages of the enhanced zoning feature in all switches in the Cisco MDS 9000 Family.
Table 7-3 Advantages of Enhanced Zoning
|
|
Enhanced Zoning Advantages
|
Administrators can make simultaneous configuration changes. Upon activation, one administrator can overwrite another administrator’s changes. |
Performs all configurations within a single configuration session. When you begin a session, the switch locks the entire fabric to implement the change. |
One configuration session for the entire fabric to ensure consistency within the fabric. |
If a zone is part of multiple zone sets, you create an instance of this zone in each zone set. |
References to the zone are used by the zone sets as required once you define the zone. |
Reduced payload size as the zone is referenced. The size is more pronounced with bigger databases. |
The default zone policy is defined per switch. To ensure smooth fabric operation, all switches in the fabric must have the same default zone setting. |
Enforces and exchanges the default zone setting throughout the fabric. |
Fabric-wide policy enforcement reduces troubleshooting time. |
To retrieve the results of the activation on a per switch basis, the managing switch provides a combined status about the activation. It does not identify the failure switch. |
Retrieves the activation results and the nature of the problem from each remote switch. |
Enhanced error reporting eases the troubleshooting process. |
To distribute the zoning database, you must reactivate the same zone set. The reactivation may affect hardware changes for hard zoning on the local switch and on remote switches. |
Implements changes to the zoning database and distributes it without reactivation. |
Distribution of zone sets without activation avoids hardware changes for hard zoning in the switches. |
The MDS-specific zone member types (IPv4 address, IPv6 address, symbolic node name, and other types) may be used by other non-Cisco switches. During a merge, the MDS-specific types can be misunderstood by the non-Cisco switches. |
Provides a vendor ID along with a vendor-specific type value to uniquely identify a member type. |
Unique vendor type. |
The fWWN-based zone membership is only supported in Cisco interop mode. |
Supports fWWN-based membership in the standard interop mode (interop mode 1). |
The fWWN-based member type is standardized. |
Merging the Database
The merge behavior depends on the fabric-wide merge control setting:
- Restrict—If the two databases are not identical, the ISLs between the switches are isolated.
- Allow—The two databases are merged using the merge rules specified in Table 7-4 .
Table 7-4 Database Zone Merge Status
|
|
|
|
The databases contain zone sets with the same name but different zones, aliases, and attributes groups. |
Successful. |
The union of the local and adjacent databases. |
The databases contains a zone, zone alias, or zone attribute group object with same name 1 but different members. |
Failed. |
ISLs are isolated. |
Empty. |
Contains data. |
Successful. |
The adjacent database information populates the local database. |
Contains data. |
Empty. |
Successful. |
The local database information populates the adjacent database. |
Caution
Remove all non-pWWN-type zone entries on all MDS switches running Cisco SAN-OS prior to merging fabrics if there is a Cisco MDS 9020 switch running FabricWare in the adjacent fabric.
The merge process operates as follows:
1. The software compares the protocol versions. If the protocol versions differ, then the ISL is isolated.
2. If the protocol versions are the same, then the zone policies are compared. If the zone policies differ, then the ISL is isolated.
3. If the zone merge options are the same, then the comparison is implemented based on the merge control setting.
a. If the setting is restrict, the active zone set and the full zone set should be identical. Otherwise the link is isolated.
b. If the setting is allow, then the merge rules are used to perform the merge.
Smart Zoning
Smart zoning supports zoning among more devices by reducing the number of zoning entries that needs to be programmed by considering device type information without increasing the size of the zone set. Smart zoning enables you to select the end device type. You can select if the end device type should be a host or a target. Smart zoning can be enabled at zone level, zone set level, member, and at VSAN level.
Note If smart zoning is set at the VSAN level, then you cannot enable or disable smart zoning at zone set level or zone level.
Configuring Zones
This section describes how to configure zones and includes the following topics:
Detailed Steps
To configure a zone and assign a zone name, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# zone name Zone1 vsan 3 switch(config-zone)# |
Configures a zone called Zone1 for the VSAN called vsan3. Note All alphanumeric characters or one of the following symbols ($, -, ^, _) are supported. |
Step 3 |
switch(config-zone)# member type value pWWN example: switch(config-zone)# member pwwn 10:00:00:23:45:67:89:ab Fabric pWWN example: switch(config-zone)# member fwwn 10:01:10:01:10:ab:cd:ef FC ID example: switch(config-zone)# member fcid 0xce00d1 FC alias example: switch(config-zone)# member fcalias Payroll Domain ID example: switch(config-zone)# member domain-id 2 portnumber 23 IPv4 address example: switch(config-zone)# member ip-address 10.15.0.0 255.255.0.0 IPv6 address example: switch(config-zone)# member ipv6-address 2001::db8:800:200c:417a/64 Local sWWN interface example: switch(config-zone)# member interface fc 2/1 Remote sWWN interface example: switch(config-zone)# member interface fc2/1 swwn 20:00:00:05:30:00:4a:de Domain ID interface example: switch(config-zone)# member interface fc2/1 domain-id 25 |
Configures a member for the specified zone (Zone1) based on the type (pWWN, fabric pWWN, FC ID, fcalias, domain ID, IPv4 address, IPv6 address, or interface) and value specified.
Caution You must only configure pWWN-type zoning on all MDS switches running Cisco SAN-OS if there is a Cisco MDS 9020 switch running FabricWare in the same fabric.
|
Tip Use a relevant display command (for example,
show interface or
show flogi database) to obtain the required value in hex format.
|
Tip Use the show wwn switch command to retrieve the sWWN. If you do not provide a sWWN, the software automatically uses the local sWWN.
Note Interface-based zoning only works with Cisco MDS 9000 Family switches. Interface-based zoning does not work if interop mode is configured in that VSAN.
Configuring a Zone Using the Zone Configuration Tool
Detailed Steps
To create a zone and move it into a zone set, follow these steps:
Step 1 Click the Zone icon in the toolbar (see Figure 7-6).
Figure 7-6 Zone Icon
You see the Select VSAN dialog box.
Step 2 Select the VSAN where you want to create a zone and click OK.
You see the Edit Local Full Zone Database dialog box.
If you want to view zone membership information, right-click in the All Zone Membership(s) column, and then click Show Details for the current row or all rows from the pop-up menu.
Step 3 Click Zones in the left pane and click the Insert icon to create a zone.
You see the Create Zone dialog box.
Step 4 Enter a zone name.
Step 5 Check one of the following check boxes:
a. Read Only —The zone permits read and denies write.
b. Permit QoS traffic with Priority —You set the priority from the drop-down menu.
c. Restrict Broadcast Frames to Zone Members
Step 6 Select the Smart Zoning check box to enable smart zoning.
Step 7 Click OK to create the zone.
If you want to move this zone into an existing zone set, skip to Step 9.
Step 8 Click Zoneset in the left pane and click the Insert icon to create a zone set.
You see the Zoneset Name dialog box.
Step 9 Enter a zone set name and click OK.
Note One of these symbols ($, -, ^, _) or all alphanumeric characters are supported. In interop mode 2 and 3, this symbol (_) or all alphanumeric characters are supported.
Step 10 Select the zone set where you want to add a zone and click the Insert icon or you can drag and drop Zone3 over Zoneset1.
You see the Select Zone dialog box.
Step 11 Click Add to add the zone.
Adding Zone Members
Once you create a zone, you can add members to the zone. You can add members using multiple port identification types.
Detailed Steps
To add a member to a zone, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Select the members you want to add from the Fabric pane and click Add to Zone or click the zone where you want to add members and click the Insert icon.
You see the Add Member to Zone dialog box.
Note The Device Alias radio button is visible only if device alias is in enhanced mode. For more information, see “Creating Device Aliases” section.
Step 4 Click the browse button and select a port name or check the LUN check box and click the browse button to configure LUNs.
Step 5 Select the options for Device Type field. You can select any one of the options: Host, Storage, or Both.
Step 6 Click Add to add the member to the zone.
Note When configuring a zone member, you can specify that a single LUN has multiple IDs depending on the operating system. You can select from six different operating systems.
Filtering End Devices Based on Name, WWN, or FC ID
Detailed Steps
To filter the end devices and device aliases, follow these steps:
Step 1 Click the Zone icon in the toolbar.
Step 2 Select Name, WWN, or FC ID from the With drop-down list.
Step 3 Enter a filter condition, such as *zo1*, in the Filter text box.
Step 4 Click Go.
Adding Multiple End Devices to Multiple Zones
Detailed Steps
To add multiple end devices to multiple zones, follow these steps:
Step 1 Click the Zone icon in the toolbar.
Step 2 Press the Ctrl key to select multiple end devices.
Step 3 Right-click the device and then select Add to Zone.
Step 4 Press the Ctrl key to select multiple zones from the pop-up window displayed.
Step 5 Click Add.
Selected end devices are added to the selected zones.
Using the Quick Config Wizard
Note The Quick Config Wizard supports only switch interface zone members.
As of Cisco SAN-OS Release 3.1(1) and NX-OS Release 4.1(2), you can use the Quick Config Wizard on the Cisco MDS 9124 Switch to add or remove zone members per VSAN. You can use the Quick Config Wizard to perform interface-based zoning and to assign zone members for multiple VSANs using Device Manager.
Note The Quick Config Wizard is supported on the Cisco MDS 9124 Fabric Switch, the Cisco MDS 9134 Fabric Switch, the Cisco Fabric Switch for HP c-Class BladeSystem, and the Cisco Fabric Switch for IBM BladeCenter.
Restrictions
The Quick Config Wizard can only be used on standalone switches that do not have any existing zoning defined on the switch.
Detailed Steps
To add or remove ports from a zone and to zone only the devices within a specific VSAN using Device Manager on the Cisco MDS 9124 Switch, follow these steps:
Step 1 Choose FC > Quick Config or click the Zone icon in the toolbar.
You see the Quick Config Wizard (see Figure 7-8) with all controls disabled and the Discrepancies dialog box (see Figure 7-7), which shows all unsupported configurations.
Note You will see the Discrepancies dialog box only if there are any discrepancies.
Figure 7-7 Discrepancies Dialog Box
Step 2 Click OK to continue.
You see the Quick Config Wizard dialog box (see Figure 7-8).
Caution If there are discrepancies and you click
OK, the affected VSANs in the zone databases are cleared. This might be disruptive if the switch is in use.
Figure 7-8 Quick Config Wizard
Step 3 Check the check box in the Ports Zoned To column for the port you want to add or remove from a zone. The check box for the matching port is similarly set. The selected port pair is added or removed from the zone, which creates a two-device zone.
The VSAN drop-down menu provides a filter that enables you to zone only those devices within a selected VSAN.
Step 4 Right-click any of the column names to show or hide a column.
Step 5 Click Next to verify the changes.
You see the Confirm Changes dialog box.
Step 6 If you want to see the CLI commands, right-click in the dialog box and click CLI Commands from the pop-up menu.
Step 7 Click Finish to save the configuration changes.
Configuring Zone Sets
This section describes how to configure zones and includes the following topics:
Activating a Zone Set
Changes to a zone set do not take effect in a full zone set until you activate it.
Detailed Steps
To activate or deactivate an existing zone set, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zoneset activate name Zoneset1 vsan 3 |
Activates the specified zone set. |
switch(config)# no zoneset activate name Zoneset1 vsan 3 |
Deactivates the specified zone set. |
To activate an existing zone set, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Click Activate to activate the zone set.
You see the pre-activation check dialog box.
Step 4 Click Yes to review the differences.
You see the Local vs. Active Differences dialog box.
Step 5 Click Close to close the dialog box.
You see the Save Configuration dialog box.
Step 6 Check the Save Running to Startup Configuration check box to save all changes to the startup configuration.
Step 7 Click Continue Activation to activate the zone set, or click Cancel to close the dialog box and discard any unsaved changes.
You see the Zone Log dialog box, which shows if the zone set activation was successful.
Detailed Steps
To deactivate an existing zone set, follow these steps:
Step 1 Right-click the zone set you want to deactivate, and then click Deactivate from the pop-up menu.
You see the Deactivate Zoneset dialog box.
Step 2 Enter deactivate in the text box, and then click OK.
You see the Input dialog box.
Step 3 Enter deactivate in the text box, and then click OK to deactivate the zone set.
Note To enable this option, you need to modify the server.properties file. Refer to the Cisco DCNM Fundamentals Guide to know more about modifying server.properties file.
Displaying Zone Membership Information
Detailed Steps
To display zone membership information for members assigned to zones, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Click Zones in the left pane. The right pane lists the members for each zone.
Note The default zone members are explicitly listed only when the default zone policy is configured as permit. When the default zone policy is configured as deny, the members of this zone are not shown.
Configuring the Default Zone Access Permission
Detailed Steps
To permit or deny traffic to members in the default zone, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# zone default-zone permit vsan 1 |
Permits traffic flow to default zone members. |
switch(config)# no zone default-zone permit vsan 1 |
Denies (default) traffic flow to default zone members. |
To permit or deny traffic to members in the default zone, follow these steps:
Step 1 Expand a VSAN and then select Default Zone in the DCNM-SAN Logical Domains pane.
Step 2 Click the Policies tab in the Information pane.
You see the zone policies information in the Information pane.
The active zone set is shown in italic type. After you make changes to the active zone set and before you activate the changes, the zone set is shown in boldface italic type.
Step 3 In the Default Zone Behaviour field, choose either permit or deny from the drop-down menu.
Detailed Steps
To create an alias, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# fcalias name AliasSample vsan 3 switch(config-fcalias)# |
Configures an alias name (AliasSample). |
Step 3 |
switch(config-fcalias)# member type value pWWN example: switch(config-fcalias)# member pwwn 10:00:00:23:45:67:89:ab fWWN example: switch(config-fcalias)# member fwwn 10:01:10:01:10:ab:cd:ef FC ID example: switch(config-fcalias)# member fcid 0x222222 Domain ID example: switch(config-fcalias)# member domain-id 2 portnumber 23 IPv4 address example: switch(config-fcalias)# member ip-address 10.15.0.0 255.255.0.0 IPv6 address example: switch(config-fcalias)# member ipv6-address 2001::db8:800:200c:417a/64 Local sWWN interface example: switch(config-fcalias)# member interface fc 2/1 Remote sWWN interface example: switch(config-fcalias)# member interface fc2/1 swwn 20:00:00:05:30:00:4a:de Domain ID interface example: switch(config-fcalias)# member interface fc2/1 domain-id 25 |
Configures a member for the specified fcalias (AliasSample) based on the type (pWWN, fabric pWWN, FC ID, domain ID, IPv4 address, IPv6 address, or interface) and value specified. |
Step 4 |
Note Multiple members can be specified on multiple lines. |
To create an FC alias, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Click Aliases in the lower left pane. The right pane lists the existing aliases.
Step 4 Click the Insert icon to create an alias.
You see the Create Alias dialog box.
Step 5 Set the Alias Name and the pWWN.
Step 6 Click OK to create the alias.
Adding Members to Aliases
Detailed Steps
To add a member to an alias, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Select the member(s) you want to add from the Fabric pane and click Add to Alias or click the alias where you want to add members and click the Insert icon.
You see the Add Member to Alias dialog box.
Note The Device Alias radio button is visible only if device alias is in enhanced mode. For more information, see “Creating Device Aliases” section.
Step 4 Click the browse button and select a port name or check the LUN check box and click the browse button to configure LUNs.
Step 5 Click Add to add the member to the alias.
Converting Zone Members to pWWN-based Members
You can convert zone and alias members from switch port or FC ID- based membership to pWWN-based membership. You can use this feature to convert to pWWN so that your zone configuration does not change if a card or switch is changed in your fabric.
Detailed Steps
To convert switch port and FC ID members to pWWN members, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Click the zone you want to convert.
Step 4 Choose Tools > Convert Switch Port/FCID members to By pWWN.
You see the conversion dialog box, which lists all members that will be converted.
Step 5 Verify the changes and click Continue Conversion.
Step 6 Click Yes in the confirmation dialog box to convert that member to pWWN-based membership.
Creating Zone Sets and Adding Member Zones
The pWWN of the virtual target does not appear in the zoning end devices database in DCNM-SAN. If you want to zone the virtual device with a pWWN, you must enter it in the Add Member to Zone dialog box when creating a zone. However, if the device alias is in enhanced mode, the virtual device names appear in the device alias database in the DCNM-SAN zoning window. In this case, users can choose to select either the device alias name or enter the pWWN in the Add Member to Zone dialog box.
For more information, see the “Adding Zone Members” section.
Set the device alias mode to enhanced when using SDV (because the pWWN of a virtual device could change).
For example, SDV is enabled on a switch and a virtual device is defined. SDV assigns a pWWN for the virtual device, and it is zoned based on the pWWN in a zone. If you later disable SDV, this configuration is lost. If you reenable SDV and create the virtual device using the same name, there is no guarantee that it will get the same pWWN again. You will have to rezone the pWWN-based zone. However, if you perform zoning based on the device-alias name, there are no configuration changes required if or when the pWWN changes.
Be sure you understand how device alias modes work before enabling them. Refer to Chapter 8, “Distributing Device Alias Services” for details and requirements about device alias modes.
Detailed Steps
To create a zone set to include several zones, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# zone set name Zoneset1 vsan 3 switch(config-zoneset)# |
Configures a zone set called Zoneset1.
Tip To activate a zone set, you must first create the zone and a zone set.
|
Step 3 |
switch(config-zoneset)# member Zone1 |
Adds Zone1 as a member of the specified zone set (Zoneset1).
Tip If the specified zone name was not previously configured, this command will return the
Zone not present error
message.
|
Step 4 |
switch(config-zoneset)# zone name InlineZone1 switch(config-zoneset-zone)# |
Adds a zone (InlineZone1) to the specified zone set (Zoneset1).
Tip Execute this step only if you need to create a zone from a zone set prompt.
|
Step 5 |
switch(config-zoneset-zone)# member fcid 0x111112 switch(config-zoneset-zone)# |
Adds a new member (FC ID 0x111112) to the new zone (InlineZone1).
Tip Execute this step only if you need to add a member to a zone from a zone set prompt.
|
Note If one zone set is active and you activate another zone set, the currently active zone set is automatically deactivated.
Tip You do not have to copy the running configuration to the startup configurationissue the copy running-config startup-config command to store the active zone set. However, you need to copy the running configuration to the startup configurationissue the copy running-config startup-config command to explicitly store full zone sets. It is not available across switch resets.
Caution
If you deactivate the active zone set in a VSAN that is also configured for IVR, the active IVR zone set (IVZS) is also deactivated and all IVR traffic to and from the switch is stopped. This deactivation can disrupt traffic in more than one VSAN. Before deactivating the active zone set, check the active zone analysis for the VSAN. To reactivate the IVZS, you must reactivate the regular zone set (refer to the
Cisco MDS 9000 Family NX-OS Inter-VSAN Routing Configuration Guide).
Caution
If the currently active zone set contains IVR zones, activating the zone set from a switch where IVR is not enabled disrupts IVR traffic to and from that VSAN. We strongly recommend that you always activate the zone set from an IVR-enabled switch to avoid disrupting IVR traffic.
Filtering Zones, Zone Sets, and Device Aliases Based on Name
Detailed Steps
To filter the zones, zone sets, or device aliases, follow these steps:
Step 1 Click the Zone icon in the toolbar (see Figure 7-6).
Step 2 Enter a filter condition, such as *zo1*, in the Filter text box.
Step 3 Click Go.
Adding Multiple Zones to Multiple Zone Sets
Detailed Steps
To add multiple zones to multiple zone sets, follow these steps:
Step 1 Click the Zone icon in the toolbar (see Figure 7-6).
Step 2 From the tree view, select Zoneset.
Step 3 Press the Ctrl key to select multiple zones.
Step 4 Right-click and then select Add to Zoneset.
Step 5 Press the Ctrl key to select multiple zone sets from the pop-up window displayed.
Step 6 Click Add.
Selected zones are added to the selected zone sets.
Enabling Full Zone Set Distribution
All switches in the Cisco MDS 9000 Family distribute active zone sets when new E port links come up or when a new zone set is activated in a VSAN. The zone set distribution takes effect while sending merge requests to the adjacent switch or while activating a zone set.
Detailed Steps
To enable full zone set and active zone set distribution to all switches on a per VSAN basis, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# zoneset distribute full vsan 33 |
Enables sending a full zone set along with an active zone set. |
To enable full zone set and active zone set distribution to all switches on a per-VSAN basis, follow these steps:
Step 1 Expand a VSAN and select a zone set in the Logical Domains pane.
You see the zone set configuration in the Information pane. The Active Zones tab is the default.
Step 2 Click the Policies tab.
You see the configured policies for the zone.
Step 3 In the Propagation column, choose fullZoneset from the drop-down menu.
Step 4 Click Apply Changes to propagate the full zone set.
Enabling a One-Time Distribution
Detailed Steps
Use the zoneset distribute vsan vsan-id command in EXEC mode to perform this distribution.
switch# zoneset distribute vsan 2
Zoneset distribution initiated. check zone status
You can perform a one-time distribution of inactive, unmodified zone sets throughout the fabric. To propagate a one-time distribution of the full zone set, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Edit Local Full Zone Database dialog box.
Step 2 Click the appropriate zone from the list in the left pane.
Step 3 Click Distribute to distribute the full zone set across the fabric.
This procedure command only distributes the full zone set information; it does not save the information to the startup configuration. You must explicitly save the running configuration to the startup configuration copy running-config startup-config commandto save the full zone set information to the startup configuration.
Note The zoneset distribute vsan vsan-id commandone-time distribution of the full zone set is supported in interop 2 and interop 3 modes, not in interop 1 mode.
Examples
Use the show zone status vsan vsan-id command to check the status of the one-time zone set distribution request.
switch# show zone status vsan 2
VSAN: 3 default-zone: permit distribute: active only Interop: 100
mode:basic merge-control:allow session:none
qos:low broadcast:disabled ronly:disabled
Zonesets:0 Zones:0 Aliases: 0
Name: nozoneset Zonesets:1 Zones:2
Status: Zoneset distribution completed at 04:01:06 Aug 28 2004
Importing and Exporting Zone Sets
Detailed Steps
To import or export the zone set information from or to an adjacent switch, follow these steps:
|
|
|
Step 1 |
switch# zoneset import interface fc1/3 vsan 2 |
Imports the zone set from the adjacent switch connected through the fc 1/3 interface for VSAN 2. |
switch# zoneset import interface fc1/3 vsan 2-5 |
Imports the zone set from the adjacent switch connected through the fc 1/3 interface for VSANs ranging from 2 through 5. |
Step 2 |
switch# zoneset export vsan 5 |
Exports the zone set to the adjacent switch connected through VSAN 5. |
switch# zoneset export vsan 5-8 |
Exports the zone set to the adjacent switch connected through the range of VSANs 5 through 8. |
To import or export the zone set information from or to an adjacent switch, follow these steps:
Step 1 Choose Tools > Merge Fail Recovery.
You see the Zone Merge Failure Recovery dialog box.
Step 2 Click the Import Active Zoneset or the Export Active Zoneset radio button.
Step 3 Select the switch from which to import or export the zone set information from the drop-down list.
Step 4 Select the VSAN from which to import or export the zone set information from the drop-down list.
Step 5 Select the interface to use for the import process.
Step 6 Click OK to import or export the active zone set.
Note Issue the import and export commands from a single switch. Importing from one switch and exporting from another switch can lead to isolation again.
Copying Zone Sets
On the Cisco MDS Family switches, you cannot edit an active zone set. However, you can copy an active zone set to create a new zone set that you can edit.
Detailed Steps
To make a copy of a zone set, follow this step:
|
|
|
Step 1 |
switch# zone copy active-zoneset full-zoneset vsan 2 Please enter yes to proceed.(y/n) [n]? y |
Makes a copy of the active zone set in VSAN 2 to the full zone set. |
switch# zone copy vsan 3 active-zoneset scp://guest@myserver/tmp/active_zoneset.txt |
Copies the active zone in VSAN 3 to a remote location using SCP. |
To make a copy of a zone set, follow these steps:
Step 1 Choose Zone > Copy Full Zone Database.
You see the Copy Full Zone Database dialog box.
Step 2 Click the Active or the Full radio button, depending on which type of database you want to copy.
Step 3 Select the source VSAN from the drop-down list.
Step 4 If you selected Copy Full, select the source switch and the destination VSAN from those drop-down lists.
Step 5 Select the destination switch from the drop-down list.
Step 6 Click Copy to copy the database.
Caution
If the Inter-VSAN Routing (IVR) feature is enabled and if IVR zones exist in the active zone set, then a zone set copy operation copies all the IVR zones to the full zone database. To prevent copying to the IVR zones, you must explicitly remove them from the full zone set database before performing the copy operation. Refer to the
Cisco MDS 9000 Family NX-OS Inter-VSAN Routing Configuration Guide for more information on the IVR feature.
Detailed Steps
To back up the full zone configuration, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Choose File > Backup > This VSAN Zones to back up the existing zone configuration to a workstation using TFTP, SFTP, SCP, or FTP.
You see the Backup Zone Configuration dialog box.
You can edit this configuration before backing up the data to a remote server.
Step 4 Provide the following Remote Options information to back up data onto a remote server:
a. Using —Select the protocol.
b. Server IP Address—Enter the IP adress of the server.
c. UserName—Enter the name of the user.
d. Password—Enter the password for the user.
e. File Name(Root Path)—Enter the path and the filename.
Step 5 Click Backup or click Cancel to close the dialog box without backing up.
Detailed Steps
To restore the full zone configuration, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Choose File > Restore to restore a saved zone configuration using TFTP, SFTP, SCP, or FTP.
You see the Restore Zone Configuration dialog box.
You can edit this configuration before restoring it to the switch.
Step 4 Provide the following Remote Options information to restore data from a remote server:
a. Using—Select the protocol.
b. Server IP Address—Enter the IP address of the server.
c. UserName—Enter the name of the user.
d. Password—Enter the password for the user.
e. File Name—Enter the path and the filename.
Step 5 Click Restore to continue or click Cancel to close the dialog box without restoring.
Note Click View Config to see information on how the zone configuration file from a remote server will be restored. When you click Yes in this dialog box, you are provided with the CLI commands that are executed. To close the dialog box, click Close.
Note Backup and Restore options are available to switches that run Cisco NX-OS Release 4.1(3) or later.
Renaming Zones, Zone Sets, and Aliases
Detailed Steps
To rename a zone, zone set, fcalias, or zone-attribute-group, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# zoneset rename oldname newname vsan 2 |
Renames a zone set in the specified VSAN. |
switch(config)# zone rename oldname newname vsan 2 |
Renames a zone in the specified VSAN. |
switch(config)# fcalias rename oldname newname vsan 2 |
Renames a fcalias in the specified VSAN. |
switch(config)# zone-attribute-group rename oldname newname vsan 2 |
Renames a zone attribute group in the specified VSAN. |
Step 3 |
switch(config)# zoneset activate name newname vsan 2 |
Activates the zone set and updates the new zone name in the active zone set. |
To rename a zone, zone set, or alias, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Click a zone or zone set in the left pane.
Step 4 Choose Edit > Rename.
An edit box appears around the zone or zone set name.
Step 5 Enter a new name.
Step 6 Click Activate or Distribute.
Cloning Zones, Zone Sets, FC Aliases, and Zone Attribute Groups
Detailed Steps
To clone a zone, zone set, fcalias, or zone-attribute-group, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# zoneset clone oldname newname vsan 2 |
Clones a zone set in the specified VSAN. |
switch(config)# zone clone oldname newname vsan 2 |
Clones a zone in the specified VSAN. |
switch(config)# fcalias clone oldname newname vsan 2 |
Clones a fcalias in the specified VSAN. |
switch(config)# zone-attribute-group clone oldname newname vsan 2 |
Clones a zone attribute group in the specified VSAN. |
Step 3 |
switch(config)# zoneset activate name newname vsan 2 |
Activates the zone set and updates the new zone name in the active zone set. |
To clone a zone, zone set, FC alias, or zone attribute group, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Choose Edit > Clone.
You see the Clone Zoneset dialog box. The default name is the word Clone followed by the original name.
Step 4 Change the name for the cloned entry.
Step 5 Click OK to save the new clone.
The cloned database now appears along with the original database.
Migrating a Non-MDS Database
Detailed Steps
To use the Zone Migration Wizard to migrate a non-MDS database, follow these steps:
Step 1 Choose Zone > Migrate Non-MDS Database.
You see the Zone Migration Wizard.
Step 2 Follow the prompts in the wizard to migrate the database.
Clearing the Zone Server Database
You can clear all configured information in the zone server database for the specified VSAN.
Detailed Steps
To clear the zone server database, use the following command:
switch# clear zone database vsan 2
To clear the zone server database, refer to the Cisco MDS 9000 Family NX-OS Fabric Configuration Guide.
Note After issuing a clear zone database command, you must explicitly issue the copy running-config startup-config to ensure that the running configuration is used when the switch reboots.
Note Clearing a zone set only erases the full zone database, not the active zone database.
Note After clearing the zone server database, you must explicitly copy the running configuration to the startup configuration to ensure that the running configuration is used when the switch reboots.
Configuring Zone-Based Traffic Priority
Detailed Steps
To configure the zone priority, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# zone name QosZone vsan 2 switch(config-zone)# |
Configures an alias name (QosZone) and enters zone configuration submode. |
Step 3 |
switch(config-zone)# attribute qos priority high |
Configures this zone to assign high priority QoS traffic to each frame matching this zone. |
switch(config-zone)# attribute qos priority medium |
Configures this zone to assign medium priority QoS traffic to each frame matching this zone. |
switch(config-zone)# attribute qos priority low |
Configures this zone to assign low priority QoS traffic to each frame matching this zone. |
switch(config-zone)# no attribute qos priority high |
Reverts to using the default low priority for this zone. |
Step 4 |
switch(config-zone)# exit switch(config)# |
Returns to configuration mode. |
Step 5 |
switch(config)# zone set name QosZoneset vsan 2 switch(config-zoneset)# |
Configures a zone set called QosZoneset for the specified VSAN (vsan 2) and enters zone set configuration submode.
Tip To activate a zone set, you must first create the zone and a zone set.
|
Step 6 |
switch(config-zoneset)# member QosZone |
Adds QosZone as a member of the specified zone set (QosZoneset).
Tip If the specified zone name was not previously configured, this command will return the
Zone not present error
message.
|
Step 7 |
switch(config-zoneset)# exit switch(config)# |
Returns to configuration mode. |
Step 8 |
switch(config)# zoneset activate name QosZoneset vsan 2 |
Activates the specified zone set. |
To configure the zone priority, follow these steps:
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
Step 2 Click the Policies tab in the Information pane.
You see the Zone policy information in the Information pane.
Step 3 Use the check boxes and drop-down menus to configure QoS on the default zone.
Step 4 Click Apply Changes to save the changes.
Configuring Default Zone QoS Priority Attributes
QoS priority attribute configuration changes take effect when you activate the zone set of the associated zone.
Note If a member is part of two zones with two different QoS priority attributes, the higher QoS value is implemented. This situation does not arise in the VSAN-based QoS as the first matching entry is implemented.
Detailed Steps
To configure the QoS priority attributes for a default zone, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone default-zone vsan 1 switch(config-default-zone)# |
Enters the default zone configuration submode. |
Step 3 |
switch(config-default-zone)# attribute qos priority high |
Sets the QoS priority attribute for frames matching these zones. |
switch(config-default-zone)# no attribute qos priority high |
Removes the QoS priority attribute for the default zone and reverts to default low priority. |
To configure the QoS priority attributes for a default zone, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Choose Edit > Edit Default Zone Attributes to configure the default zone QoS priority attributes.
Step 4 Check the Permit QoS Traffic with Priority check box and set the Qos Priority drop-down menu to low, medium, or high.
Step 5 Click OK to save these changes.
Configuring the Default Zone Policy
Detailed Steps
To permit or deny traffic in the default zone, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Choose Edit > Edit Default Zone Attributes to configure the default zone QoS priority attributes.
You see the Modify Default Zone Properties dialog box.
Step 4 Set the Policy drop-down menu to permit to permit traffic in the default zone, or set it to deny to block traffic in the default zone.
Step 5 Click OK to save these changes.
Detailed Steps
To configure smart zoning, follow these steps:
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
Step 2 Click the Smart Zoning tab in the Information pane.
You see the smart zoning information in the Information pane.
Step 3 You can view the details under the Switch, Status, Command, Last Command, and Result headings.
Step 4 You can set the Status, and Command fields.
Step 5 Click Apply Changes to save these changes.
Configuring Global Zone Policies
Detailed Steps
To broadcast frames in the basic zoning mode, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone broadcast enable vsan 2 |
Broadcasts frames for the specified VSAN. |
switch(config)# no zone broadcast enable vsan 3 |
Disables (default) broadcasting for the specified VSAN. |
Step 3 |
switch(config)# zone name BcastZone vsan 2 switch(config-zone)# |
Creates a broadcast zone in the specified VSAN and enters zone configuration submode. |
Step 4 |
switch(config-zone)# member pwwn 21:00:00:20:37:f0:2e:4d |
Adds the specified member to this zone. |
Step 5 |
switch(config-zone)# attribute broadcast |
Specifies this zone to be broadcast to other devices. |
Step 6 |
switch(config-zone)# end switch# show zone vsan 2 zone name bcast-zone vsan 2 attribute broadcast pwwn 21:00:00:e0:8b:0b:66:56 pwwn 21:00:00:20:37:f0:2e:4d |
Displays the broadcast configuration. |
To configure the broadcast attribute for a default zone, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone default-zone vsan 1 switch(config-default-zone)# |
Enters the default zone configuration submode. |
Step 3 |
switch(config-default-zone)# attribute broadcast |
Sets broadcast attributes for the default zone. |
switch(config-default-zone)# no attribute broadcast |
Reverts the default zone attributes to read-write (default). |
To configure global zone policy, follow these steps:
Step 1 In the Logical Domains pane, select ALL VSANs.
Step 2 Click the Global Zone Policies tab in the Information pane.
You see the Global Zone Policy information in the Information pane.
Step 3 Set the type of switch under the Switch column.
Step 4 You either Deny or Permit the Zone Behaviour and set the Propagation Mode.
Step 5 Select if the Smart Zoning feature is enabled or disabled.
Step 6 Click Apply Changes to save these changes.
Configuring Broadcast Zoning
Detailed Steps
To broadcast frames in the basic zoning mode, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone broadcast enable vsan 2 |
Broadcasts frames for the specified VSAN. |
switch(config)# no zone broadcast enable vsan 3 |
Disables (default) broadcasting for the specified VSAN. |
Step 3 |
switch(config)# zone name BcastZone vsan 2 switch(config-zone)# |
Creates a broadcast zone in the specified VSAN and enters zone configuration submode. |
Step 4 |
switch(config-zone)# member pwwn 21:00:00:20:37:f0:2e:4d |
Adds the specified member to this zone. |
Step 5 |
switch(config-zone)# attribute broadcast |
Specifies this zone to be broadcast to other devices. |
Step 6 |
switch(config-zone)# end switch# show zone vsan 2 zone name bcast-zone vsan 2 attribute broadcast pwwn 21:00:00:e0:8b:0b:66:56 pwwn 21:00:00:20:37:f0:2e:4d |
Displays the broadcast configuration. |
To configure the broadcast attribute for a default zone, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone default-zone vsan 1 switch(config-default-zone)# |
Enters the default zone configuration submode. |
Step 3 |
switch(config-default-zone)# attribute broadcast |
Sets broadcast attributes for the default zone. |
switch(config-default-zone)# no attribute broadcast |
Reverts the default zone attributes to read-write (default). |
To broadcast frames in the basic zoning mode, follow these steps:
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
Step 2 Click the Policies tab in the Information pane.
You see the Zone policy information in the Information pane.
Step 3 Check the Broadcast check box to enable broadcast frames on the default zone.
Step 4 Click Apply Changes to save these changes.
Configuring a LUN-Based Zone
Detailed Steps
To configure a LUN-based zone, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone name LunSample vsan 2 switch(config-zone)# |
Configures a zone called LunSample for the specified VSAN (vsan 2) and enters zone configuration submode. |
Step 3 |
switch(config-zone)# member pwwn 10:00:00:23:45:67:89:ab lun 0x64 |
Configures a zone member based on the specified pWWN and LUN value. Note The CLI interprets the LUN identifier value as a hexadecimal value whether or not the 0x prefix is included. LUN 0x64 in hex format corresponds to 100 in decimal format. |
switch(config-zone)# member fcid 0x12465 lun 0x64 |
Configures a zone member based on the FC ID and LUN value. |
To configure a LUN-based zone, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Click the zone where you want to add members and click the Insert icon.
You see the Add Member to Zone dialog box.
Step 4 Click either the WWN or FCID radio button from the Zone By options to create a LUN-based zone.
Step 5 Check the LUN check box and click the browse button to configure LUNs.
Step 6 Click Add to add this LUN-based zone.
Assigning LUNs to Storage Subsystems
LUN masking and mapping restricts server access to specific LUNs. If LUN masking is enabled on a storage subsystem and if you want to perform additional LUN zoning in a Cisco MDS 9000 Family switch, obtain the LUN number for each host bus adapter (HBA) from the storage subsystem and then configure the LUN-based zone procedure provided in the “Configuring a LUN-Based Zone” section.
Note Refer to the relevant user manuals to obtain the LUN number for each HBA.
Caution
If you make any errors when assigning LUNs, you might lose data.
Configuring Read-Only Zones
Detailed Steps
To configure read-only zones, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone name Sample2 vsan 2 switch(config-zone)# |
Configures a zone called Sample2 for the specified VSAN (vsan 2) and enters zone configuration submode. |
Step 3 |
switch(config-zone)# attribute read-only |
Sets read-only attributes for the Sample2 zone. Note The default is read-write for all zones. |
switch(config-zone)# no attribute read-only |
Reverts the Sample2 zone attributes to read-write. |
To configure the read-only option for a default zone, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone default-zone vsan 1 switch(config-default-zone)# |
Enters the default zone configuration submode. |
Step 3 |
switch(config-default-zone)# attribute read-only |
Sets read-only attributes for the default zone. |
switch(config-default-zone)# no attribute read-only |
Reverts the default zone attributes to read-write (default). |
To configure read-only zones, follow these steps:
Step 1 Choose Zone > Edit Local Full Zone Database.
You see the Select VSAN dialog box.
Step 2 Select a VSAN and click OK.
You see the Edit Local Full Zone Database dialog box for the selected VSAN.
Step 3 Click Zones in the left pane and click the Insert icon to add a zone.
You see the Create Zone Dialog Box.
Step 4 Check the Read Only check box to create a read-only zone.
Step 5 Click OK.
Note To configure the read-only option for a default zone, see “Configuring the Default Zone Policy” section.
Changing from Basic Zoning to Enhanced Zoning
Detailed Steps
To change to the enhanced zoning mode from the basic mode, follow these steps:
Step 1 Verify that all switches in the fabric are capable of working in the enhanced mode.
If one or more switches are not capable of working in enhanced mode, then your request to move to enhanced mode is rejected.
Step 2 Set the operation mode to enhanced zoning mode.
You will be able to automatically start a session, acquire a fabric wide lock, distribute the active and full zoning database using the enhanced zoning data structures, distribute zoning policies, and then release the lock. All switches in the fabric then move to the enhanced zoning mode.
Tip After moving from basic zoning to enhanced zoning, we recommend that you save the running configuration.
Changing from Enhanced Zoning to Basic Zoning
The standards do not allow you to move back to basic zoning. However, Cisco MDS switches allow this move to enable you to downgrade and upgrade to other Cisco SAN-OS or Cisco NX-OS releases.
Detailed Steps
To change to the basic zoning mode from the enhanced mode, follow these steps:
Step 1 Verify that the active and full zone set do not contain any configuration that is specific to the enhanced zoning mode.
If such configurations exist, delete them before proceeding with this procedure. If you do not delete the existing configuration, the Cisco NX-OS software automatically removes them.
Step 2 Set the operation mode to basic zoning mode.
You will be able to automatically start a session, acquire a fabric wide lock, distribute the zoning information using the basic zoning data structure, apply the configuration changes, and release the lock from all switches in the fabric. All switches in the fabric then move to basic zoning mode.
Note If a switch running Cisco SAN-OS Release 2.0(1b) and NX-OS 4(1b) or later, with enhanced zoning enabled is downgraded to Cisco SAN-OS Release 1.3(4), or earlier, the switch comes up in basic zoning mode and cannot join the fabric because all the other switches in the fabric are still in enhanced zoning mode.
Enabling Enhanced Zoning
By default, the enhanced zoning feature is disabled in all switches in the Cisco MDS 9000 Family.
Detailed Steps
To enable enhanced zoning in a VSAN, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone mode enhanced vsan 3000 Set zoning mode command initiated. Check zone status |
Enables enhanced zoning in the specified VSAN. |
switch(config)# no zone mode enhanced vsan 150 Set zoning mode command initiated. Check zone status |
Disables enhanced zoning in the specified VSAN. |
To enable enhanced zoning in a VSAN, follow these steps:
Step 1 Expand a VSAN and then select a zone set in the Logical Domains pane.
You see the zone set configuration in the Information pane.
Step 2 Click the Enhanced tab.
You see the current enhanced zoning configuration.
Step 3 From the Action drop-down menu, choose enhanced to enable enhanced zoning in this VSAN.
Step 4 Click Apply Changes to save these changes.
Modifying the Zone Database
Modifications to the zone database is done within a session. A session is created at the time of the first successful configuration command. On creation of a session, a copy of the zone database is created. Any changes done within the session are performed on this copy of the zoning database. These changes in the copy zoning database are not applied to the effective zoning database until you commit the changes. Once you apply the changes, the session is closed.
If the fabric is locked by another user and for some reason the lock is not cleared, you can force the operation and close the session. You must have permission (role) to clear the lock in this switch and perform the operation on the switch from where the session was originally created.
Detailed Steps
To commit or discard changes to the zoning database in a VSAN, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone commit vsan 2 No pending info found |
Applies the changes to the enhanced zone database and closes the session. |
switch(config)# zone commit vsan 3 force |
Forcefully applies the changes to the enhanced zone database and closes the session created by another user. |
switch(config)# no zone commit vsan 2 |
Discards the changes to the enhanced zone database and closes the session. |
switch(config)# no zone commit vsan 3 force |
Forcefully discards the changes to the enhanced zone database and closes the session created by another user. |
Releasing Zone Database Locks
Detailed Steps
To release the session lock on the zoning database on the switches in a VSAN, use the no zone commit vsan command from the switch where the database was initially locked.
switch(config)# no zone commit vsan 2
If session locks remain on remote switches after using the no zone commit vsan command, you can use the clear zone lock vsan command on the remote switches.
switch# clear zone lock vsan 2
Note We recommend using the no zone commit vsan command first to release the session lock in the fabric. If that fails, use the clear zone lock vsan command on the remote switches where the session is still locked.
Creating Attribute Groups
In enhanced mode, you can directly configure attributes using attribute groups.
Detailed Steps
To configure attribute groups, follow these steps:
Step 1 Create an attribute group.
switch(config)# zone-attribute-group name SampleAttributeGroup vsan 2
switch(config-attribute-group)#
Step 2 Add the attribute to an attribute-group object.
switch(config-attribute-group)# readonly
switch(config-attribute-group)# broadcast
switch(config-attribute-group)# qos priority medium
Step 3 Attach the attribute-group to a zone.
switch(config)# zone name Zone1 vsan 2
switch(config-zone)# attribute-group SampleAttributeGroup
switch(config-zone)# exit
Step 4 Activate the zone set.
switch(config)# zoneset activate name Zoneset1 vsan 2
The attribute-groups are expanded and only the configured attributes are present in the active zone set.
To configure attribute groups, refer to the Cisco MDS 9000 Family NX-OS Fabric Configuration Guide.
Detailed Steps
To perform a zone merge analysis, follow these steps:
Step 1 Choose Zone > Merge Analysis.
You see the Zone Merge Analysis dialog box.
Step 2 Select the first switch to be analyzed from the Check Switch 1 drop-down list.
Step 3 Select the second switch to be analyzed from the And Switch 2 drop-down list.
Step 4 Enter the VSAN ID where the zone set merge failure occurred in the For Active Zoneset Merge Problems in VSAN Id field.
Step 5 Click Analyze to analyze the zone merge.
Step 6 Click Clear to clear the analysis data in the Zone Merge Analysis dialog box.
Configuring Zone Merge Control Policies
Detailed Steps
To configure merge control policies, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone merge-control restrict vsan 4 |
Configures a restricted merge control setting for this VSAN. |
switch(config)# no zone merge-control restrict vsan 2 |
Defaults to using the allow merge control setting for this VSAN. |
switch(config)# zone commit vsan 4 |
Commits the changes made to VSAN 4. |
To configure merge control policies, refer to the Cisco MDS 9000 Family NX-OS Fabric Configuration Guide.
Preventing Zones From Flooding FC2 Buffers
By using the zone fc2 merge throttle enable command you can throttle the merge requests that are sent from zones to FC2 and prevent zones from flooding FC2 buffers. This command is enabled by default. This command can be used to prevent any zone merge scalability problem when you have a lot of zones. Use the show zone status command to view zone merge throttle information.
Permitting or Denying Traffic in the Default Zone
Detailed Steps
To permit or deny traffic in the default zone, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# zone default-zone permit vsan 5 |
Permits traffic flow to default zone members. |
switch(config)# no zone default-zone permit vsan 3 |
Denies traffic flow to default zone members and reverts to factory default. |
Step 3 |
switch(config)# zone commit vsan 5 |
Commits the changes made to VSAN 5. |
Broadcasting a Zone
You can specify an enhanced zone to restrict broadcast frames generated by a member in this zone to members within that zone. Use this feature when the host or storage devices support broadcasting.
Table 7-6 identifies the rules for the delivery of broadcast frames.
Table 7-6 Broadcasting Requirements
|
|
|
|
Yes |
Yes |
Yes |
Broadcast to all Nx ports that share a broadcast zone with the source of broadcast frames. |
No |
Yes |
Yes |
Broadcast to all Nx ports. |
Yes |
No |
No |
Broadcasting is disabled. |
Tip If any NL port attached to an FL port shares a broadcast zone with the source of the broadcast frame, then the frames are broadcast to all devices in the loop.
Detailed Steps
To broadcast frames in the enhanced zoning mode, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# zone-attribute-group name BroadcastAttr vsan 2 |
Configures the zone attribute group for the required VSAN. |
switch(config)# no zone-attribute-group name BroadAttr vsan 1 |
Removes the zone attribute group for the required VSAN. |
Step 3 |
switch(config-attribute-group)# broadcast switch(config-attribute-group)# exit switch(config)# |
Creates a broadcast attribute for this group and exits this submode. |
switch(config-attribute-group)# no broadcast |
Removes broadcast attribute for this group and exits this submode. |
Step 4 |
switch(config)# zone name BroadcastAttr vsan 2 switch(config-zone)# |
Configures a zone named BroadcastAttr in VSAN 2. |
Step 5 |
switch(config-zone)# member pwwn 21:00:00:e0:8b:0b:66:56 switch(config-zone)# member pwwn 21:01:00:e0:8b:2e:80:93 switch(config-zone)# attribute-group name BroadcastAttr switch(config-zone)# exit switch(config)# |
Adds the specified members to this zone and exits this submode. |
Step 6 |
switch(config)# zone commit vsan 1 Commit operation initiated switch(config)# end |
Applies the changes to the enhanced zone configuration and exits this submode. |
Step 7 |
switch# show zone vsan 1 zone name BroadcastAttr vsan 1 zone-attribute-group name BroadcastAttr vsan 1 broadcast pwwn 21:00:00:e0:8b:0b:66:56 pwwn 21:01:00:e0:8b:2e:80:93 |
Displays the broadcast configuration |
Configuring System Default Zoning Settings
Detailed Steps
You can configure default settings for default zone policies, full zone distribution, and generic service permissions for new VSANs on the switch. To configure switch-wide default settings, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# system default zone default-zone permit |
Configures permit as the default zoning policy for new VSANs on the switch. |
switch(config)# no system default zone default-zone permit |
Configures deny (default) as the default zoning policy for new VSANs on the switch. |
Step 3 |
switch(config)# system default zone distribute full |
Enables full zone database distribution as the default for new VSANs on the switch. |
switch(config)# no system default zone distribute full |
Disables (default) full zone database distribution as the default for new VSANs on the switch. Only the active zone database is distributed. |
Step 4 |
switch(config)# system default zone gs read |
Configures read only as the default generic service permission for new VSANs on the switch. |
switch(config)# system default zone gs read-write |
Configures (default) read-write as the default generic service permission for new VSANs on the switch. |
switch(config)# no system default zone gs read-write |
Configures none(deny) as the default generic service permission for new VSANs on the switch. |
Note Since VSAN 1 is the default VSAN and is always present on the switch, the system default zone commands have no effect on VSAN 1.
Configuring Zone Generic Service Permission Settings
Zone generic service permission setting is used to control zoning operation through generic service (GS) interface. The zone generic service permission can be read-only, read-write or none (deny).
Detailed Steps
To configure generic service (GS) settings, follow these steps:
|
|
|
Step 1 |
switch# config t |
Enters configuration mode. |
Step 2 |
switch(config)# zone gs read vsan 3000 |
Configures gs permission value as read only in the specified vsan. |
switch(config)# zone gs read-write vsan 3000 |
Configures gs permission value as read-write in the specified vsan. |
switch(config)# no zone gs read-write vsan 3000 |
Configures gs permission value as none(deny) in the specified vsan. |
Compacting the Zone Database for Downgrading
Prior to Cisco SAN-OS Release 3.0(1), only 2000 zones are supported per VSAN. If you add more than 2000 zones to a VSAN, a configuration check is registered to indicate that downgrading to a previous release could cause you to lose the zones over the limit. To avoid the configuration check, delete the excess zones and compact the zone database for the VSAN. If there are 2000 zones or fewer after deleting the excess zones, the compacting process assigns new internal zone IDs and the configuration can be supported by Cisco SAN-OS Release 2.x or earlier. Perform this procedure for every VSAN on the switch with more than 2000 zones.
Note A merge failure occurs when a switch supports more than 2000 zones per VSAN but its neighbor does not. Also, zone set activation can fail if the switch has more than 2000 zones per VSAN and not all switches in the fabric support more than 2000 zones per VSAN.
Detailed Steps
To delete zones and compact the zone database for a VSAN, follow these steps:
|
|
|
Step 1 |
switch# config t switch(config)# |
Enters configuration mode. |
Step 2 |
switch(config)# no zone name ExtraZone vsan 10 |
Deletes a zone to reduce the number of zones to 2000 or fewer. |
Step 3 |
switch(config)# zone compact vsan 10 |
Compacts the zone database for VSAN 10 to recover the zone ID released when a zone was deleted. |
To compact the zone database for downgrading, refer to the Cisco MDS 9000 Family NX-OS Fabric Configuration Guide.