Cisco Nexus Fibre Channel configuration template


I recently had the opportunity to configure native fibre channel in my test lab at work using Nexus 55xx series switches and Cisco’s UCS. What I’ll do in this post is to share my templatized fibre channel configuration in a somewhat ordered way, at least from the Nexus point of view. This test lab was configured with the attitude that it should show off the capabilities of the hardware and software. Concepts included in this initial configuration include NPIV, NPV, SAN port-channels, F_Port trunking, VSANs, device aliases, and of course, standard FC concepts like zones and zonesets.

Let me first share the end-state as of today, what I’ll call Phase I. I’ll explain what my initial plan was for Phase I and, after learning a bit more, what I plan to do for Phase II.  Please feel free to correct me in the comments below – I made a lot of mistakes configuring this and I wouldn’t be surprised if there’re a few more in there.

Controller connections

So we’ll start from the top. You can see that each NetApp controller, Controller A and Controller B, is connected to each fabric, Fabric A and Fabric B, respectively using two 8 Gbps links. If you’re already somewhat familiar with FC, you’ll remember that it’s useful to provide two distinct fabrics from initiators to targets, such as a server to storage, or storage to tape.

You may ask why the storage is cross connected to each fabric when hosts are generally not cross-connected. I’ll remind you that there are actually two controllers in the diagram. Each controller can be considered an individual host. The storage system is actually a NetApp FAS2240-2 in a dual-controller, HA configuration. Cross connecting each controller is useful because in case of a failure in a fabric, the multipathing software will sense the failure and move traffic to the other fabric. Multipath software installed on the initiator operating system or hypervisor will discover and monitor each distinct path across each fabric to each controller’s targets. For example, imagine that each controller is only connected to one fabric, say, Controller A to Fabric A and Controller B to Fabric B. Imagine an ESXi host with FC datastores residing on both Controller A and Controller B. If a fabric fails, such as Fabric Interconnect A or the Nexus 5596, the ESXi host might be forced to take a non-optimal path to its LUN through Controller B. It’s considered a non-optimal path because Controller A hasn’t failed, and thus still owns the LUN, but I/O must traverse Controller B through an HA interconnect to reach Controller A and the associated LUN. This is the best case. A worst case might be that ALUA or multipathing somewhere in the stack is not configured properly and there’s no controller failover because the storage controller hasn’t actually failed – rather a switch in the fabric has failed. In this case, the datastores hosted on Controller A go offline because the host cannot access them. This is why it’s useful to connect each storage controller to each fabric. Should there be a complete fabric failure, multipathing software in the host will simply move all traffic to the other fabric which still has an optimum path to the storage.

In the case of a storage controller failing, we assume that some type of high-availability is configured and all disks and associated logical storage units become owned by the remaining, online controller. The host notices the failure of the original storage controller and, upon successful controller failover, will begin accessing the same datastores now hosted by the online controller through an optimized path, possibly on the same fabric.

ISLs and why I don’t need them

Now, here’s one thing I now know I did wrong in this configuration. While attending a NetApp SAN bootcamp for partners this week, I had the opportunity to talk to some experts. Although, if I can say, I expected to learn such when I broached the subject. I’m talking about whether or not I need to include the interswitch link (ISL) between each 5500 Nexus. Currently, it’s configured as an Extended ISL (EISL), SAN port-channel trunk (it’s “Extended” because it’s carrying multiple VSANs). It’s trunking the two VSANs in the fabric, 100 and 200.

As I stepped back to admire my handy-work in the lab, I realized that I created what I wanted to: two distinct fabrics in two distinct VSANs which gives ESXi hosts in the UCS chassis two distinct paths to each storage controller. But I was bothered by the idea that I was trunking the VSANs across this ISL. Only VSAN 100 exists in Fabric A and only VSAN 200 exists in Fabric B. But with the ISL in place, now each VSAN exists on each Nexus and therefore, each fabric. An example of what the 5596 ISL looks like is shown below, but each switch shows the same thing: each VSAN active on each switch.

In addition to this, I’ve created SAN port-channel trunks from each Nexus to each UCS Fabric Interconnect (operating in End Host Mode). Now, the trunk to the interconnects is ok, and warranted, because I’d like to be able to add more VSANs (read more security zones, perhaps for multi-tenancy) at a later time. But the idea that was clarified in the SAN bootcamp this week is that ISLs are only needed if initiators and targets are on either side in each trunked VSAN. In this case, initiators and targets are going north-south. This particular ISL would be useful if I had initiators, in both VSANs attached to, say, the 5548 and targets, in both VSANs, attached to the 5596, i.e. east-west traffic. That is not what’s configured. So in short, this ISL is not needed. I’ll be removing it the next chance I get.

Nexus configuration overview

Included in this post is the actual FC configuration for the Nexus switches. Let me share the overview of that configuration first.

VSAN definitions

Each switch has defined the VSANs that run through them. As I mentioned above, this configuration has each fabric’s VSAN defined on each Nexus. This is not needed. There doesn’t need to be an ISL or VSAN trunking between fabrics. So what it should look like is that only VSANs defined on each swtich, on each fabric, are those that use that fabric for communication. Seems obvious, I know, leave me alone about it already. So VSAN 100 is defined in Fabric A on the Nexus 5596 and VSAN 200 is defined in Fabric B on the Nexus 5548.

Switch priority

The next configuration item is switch priority. Priority is set per VSAN. Switch priority will define which switch in a VSAN is the principal switch. The principal switch is responsible for assigning domain IDs. Domain IDs uniquely identify each switch in the fabric. The default priority for the Nexus is 128, lower priority has precedence. I wanted to force the election of the 5596 as the principal switch so I configured a priority of 64 for each VSAN.

Domain ID

As just mentioned, the domain ID of a switch uniquely identifies it on an FC fabric, specifically on a VSAN. When end hosts log into the fabric, they’re assigned FC IDs and the switch’s domain ID is included in the FC ID, thus uniquely identifying the end host port on the fabric. It’s recommend to statically assign domain IDs per switch. This is likely done as a security precaution. By assigning static domain IDs, one can configure the entire fabric to only allow certain domain IDs. Switches that can’t obtain a dynamically assigned domain ID (some dude walks up and plugs an FC switch into your fabric) are usually isolated from the fabric. This reminds me, somewhat, of VTP in an Ethernet network. If you don’t have the statically assigned VTP domain name and/or password, you can’t share in the joy of auto-magic VLAN distribution. Though if you’re isolated in an FC fabric, your traffic is going nowhere.

SAN port-channels

I configured two-link SAN port-channels between each Nexus and its respective UCS Fabric Interconnect. I also configured these SAN port-channels as trunks so that we can show off how multiple tenants can be provided their own VSAN and thus keep their storage traffic completely segregated in the fabric. As mentioned above, the ISL SAN port-channel is going away, so I won’t mention it any more.

Default zoning

I suspended the default zone (zone 1) and denied traffic flow to default zone members. This ensures that members not assigned to an active zone, and thus in the default zone, are not permitted to talk to each other.

FC port initialization

Depending on what the port is plugged into, it will be statically assigned an FC port type. Common FC port types include

  • N_Port – These are end device ports, such as an end host HBA port. N_Ports plug into F_Ports.
  • F_Port – These are switch ports that plug into end host ports, N_Ports.
  • E_Port – An E_Port plugs into another E_Port and is configured in an ISL.

Variations of these ports are also seen, such as TE_Port, which is a trunking E_Port, which is part of an EISL. You’ll also see TF_Ports, which are ports connected to end hosts but are also trunking VSANs. NP_Ports also exist and are used in N_Port virtualization to proxy other N_Port fabric logins.

Aliases

As most are familiar, working with strings of hexadecimal numbers is not exactly glorious work. It’s useful to define aliases for these WWNs, in my case, WWPNs, so we don’t have to manage hex strings. The Nexus supports two types of aliases. FC aliases are defined per VSAN. As long as the FC aliases are used in the zone in which they’re defined, you can reference them all day long. But if you wanted to move that piece of hardware into another VSAN, you’d have to redefine the FC alias in that particular VSAN. Probably not that big of deal, but still annoying. A better idea might be to use device aliases. Device aliases can be used just like FC aliases, except now they’re defined once and can then forever more be used in any VSAN without ever having to be redefined. Pretty useful if you ask me. So that’s what I did here.

Zones and zonesets

And finally, the meat and potatoes of any FC fabric: zones and zonesets. So I might have to rework this a bit. I created ZONESET-1 in Fabric A on the Nexus 5596 and ZONESET-2 in Fabric B on the Nexus 5548. ZONESET-1 only contained zones with initiators and targets from Fabric A and ZONESET-2 only contained zones with initiators and targets from Fabric B. Because of the ISL between the Nexus switches (and our friend CF distribute), these zonesets, zones, and device aliases were shared across switches. For example, the 5596 now has ZONESET-1 and ZONESET-2 defined. As you know, only one zoneset can be active at any one time on any particular switch. But each switch shows two zonesets, the active zoneset in their fabric and a zoneset from the *other* fabric that should never be active on that particular switch. So once I remove the ISL between the Nexus switches, I’ll remove the (alien?) zoneset that shouldn’t be in either switch.

UCS configuration

Since I only have ESXi hosts on my UCS blades and no other servers to work with, I wanted to configure a VM in FC NPIV mode so I could show an end-to-end FC configuration. After getting my lab configured, the last part I needed to do was configure the actual VM for FC NPIV and start presenting storage. From what I could find, or couldn’t find, UCS doesn’t support an NPIV-enabled VM. By the time I reached this point, I had already converted the UCS Fabric Interconnects back to their default FC End Host mode. End Host Mode is also known as NPV mode which is generally required on first hop FC switches to which NPIV-enabled VMs connect. They were configured for FC Switch Mode because we had our NetApp controllers directly attached to the interconnects, which requires such a configuration. So what I have is FC storage presented to the ESXi hosts only.

I won’t walk through the UCS configuration, but I’ll include some screenshots. For instance, while in FC Switch Mode, the interconnects didn’t connect to the Nexii (that’s the plural for Nexus. If it’s not, it should be) via FC. Remember, the storage was directly connected via FC to the interconnects and so were the ESXi hosts. All storage traffic stayed local to the interconnects. So I had to create Uplink FC ports and in particular, an uplink SAN port-channel. I did this through the SAN tab and the SAN Cloud configuration. For those not familiar, SAN Cloud on UCS refers to a real SAN fabric, i.e. the interconnects uplink to FC switches. The Storage Cloud, on the other hand, is used when FC targets are connected directly to the interconnects in FC Switch Mode. As you can see in the screenshot to the right, I’ve only defined VSAN 100 trunked to the UCS in Fabric A. Fabric B is just the opposite, with only VSAN 200 defined and trunked. The corresponding configuration for Fabric A FC Port-Channel 51 is also shown.

Besides creating a SAN port-channel for each interconnect, I had to configure each ESXi host’s vHBA to reside on their respective fabrics. This configuration change varies depending on if or how you’re using templates. The end result, though, looks like this:

Cisco Nexus FC configuration template

Now for my benefit and yours, I want to share my somewhat templatized or at least ordered Nexus FC switch configuration. I couldn’t find the equivalent of this anywhere on the webs, so I pored over the SAN Switching Configuration Guide for my version of Nexus, 6.0(2)N1(1).


!enable FC features
feature fcoe
feature fport-channel-trunk  !only needed for Nexus-to-UCS port channels

!enable FC interfaces. I'm using the N55-M16UP in slot 2 of each Nexus
slot 2
port 9-16 type fc
copy ru st
reload

!distribute command only needed if multiple switches in fabric
!also is enabled by default, but let's make sure
cf distribute

!configure new VSANs
vsan database
vsan 100
vsan 100 name FABRIC-A
vsan 200
vsan 200 name FABRIC-B

!configure switch priority
fcdomain priority 64 vsan 100
fcdomain priority 64 vsan 200

!configure static domain IDs
fcdomain domain 10 static vsan 100
fcdomain domain 10 static vsan 200
fcdomain domain 20 static vsan 100
fcdomain domain 20 static vsan 200
fcdomain restart vsan 100
fcdomain restart vsan 200

!configure allowed domain IDs
!distribute command only needed if multiple switches in fabric
fcdomain allowed 10,20 vsan 100
fcdomain allowed 10,20 vsan 200
fcdomain distribute

!configure a SAN port-channel
!Cisco recommends mode active on second switch instead of E
!switchport mode could be F if connecting to
!End Host Mode UCS Fabric Interconnect
interface san-port-channel
switchport description <description!>
channel mode active
switchport mode E
switchport trunk mode on
switchport trunk allowed vsan 100
switchport trunk allowed vsan add 200
no shutdown

!assign FC ports to previously configured SAN port-channel
!again, could be mode F
interface fc /
switchport description
switchport mode E
channel-group  force

!assign FC interfaces or SAN port-channels to VSANs
vsan database
vsan  interface san-port-channel

!configure default zone security
vsan database
vsan 1 suspend

!configure device aliases
!distribute command only needed if multiple switches in fabric
device-alias distribute
device-alias database
device-alias name  pwwn 
device-alias mode enhanced
device-alias commit  !
!create zones
zone name  vsan
member device-alias
zone commit

!create zonesets
zoneset name  vsan
member
member
zoneset distribute full vsan
zoneset activate name  vsan
zone commit vsan
cop run start

!if troubleshooting zone merges across ISLs try
show port internal info interface san-port-channel

!also useful
show vsan  membership
show zone
show zoneset
show device-alias database
show interface san-port-channel

Future work

We also have two MDS switches in the lab that I’d like to get up and running. I’ll put these in front of the NetApp, but I’m curious as to how to interconnect them to the Nexii. Should I have some sort of partial-mesh or should I stay with two completely separate fabrics? I’ll have to whiteboard it and look at failure scenarios. Feel free to leave your comments on this.

Google


6 Comments on “Cisco Nexus Fibre Channel configuration template”

  1. Robert says:

    Nice job Mike. I will add, that most setups will keep the Fabrics separate contrary to what you learn taking a Cisco class.

    • Thanks, Robert. This was really my introduction to FC. Thankfully we have a nice lab that I could break for the sake of learning. I’ve learned much more since and have deployed more FC for clients using Nexus, MDS, UCS, NetApp and Dell Compellent. I mention in the section “ISLs and why I don’t need them” that I realized after the config was complete that the ISL between the Nexus switches wasn’t needed. While I would have enjoyed taking a proper Cisco FC course, this lab work was the result of a lot of reading of vendor documentation. The tough part was that I was learning in a bubble (hence the worthless ISL). It’s feedback like yours that’s useful. All the best, my friend.

  2. cdhallman says:

    I’m not sure if I missed something here. I see where you changed ports 9-16 to FC ports, but where did you configure any of those ports?

    • So I should clean up this config template a bit to be more clear. I leave out actual port numbers and that makes it a bit unclear.

      By default, all ports will be F ports. So you don’t really need to change those for hosts. You do, however, need to assign the F ports to VSANs, which I’ve done in lines 60-62. Line 60 at least calls out the fact that you can assign standard F ports to VSANs. In the config, I’ve only added the san-port-channel.

      You don’t see individual F port configs (outside of the san-port-channel ports) because I need proof-readers for my blog posts. The NetApp-facing ports are F ports and should be called out in the config. With this being a template, I think I may have been light on actual configuration details.

      While I clean up this config template, keep these overall ideas in mind:

      – All ports are F ports by default when FC is turned on
      – FC interfaces need to be added to a VSAN (you don’t really want to use VSAN 1)
      – FC interfaces should use “switchport description” because you’re a good SAN admin and document your configs!

      All the best,

      Mike

  3. Noman Rajput says:

    Thanks Mike for this post, you made my day… this is what i exactly going to deploy in a live data Center…

    Regards,
    Noman Rajput
    From Karachi Pakistan

  4. Ariq says:

    Hi there Bro
    HI, I have 1 nexus switch Cisco 5548UP and 1 Dell storage Compllent SC 4020.

    Im a network guy and i have no experience with Nexus.and I have to configure the Nexus for the Dell storage and Dell servers ,I want to know , What configuration i need to configure in the nexus switch so that the Storage works fine.

    Here is the diagram :

    Router –>Firewall–> Core-SW –>**Nexus—Storage–>Enclosure**
    |
    Dell Servers(2 qnty: DB and Mail Servers)

    Here are the ports i have already configured:
    My Inventory : 1G Copper SFP
    : 2 X 10GB SFP
    : 8 X 8GB SFP

    So Far i have already Done the cabling as per Dell Complent’s Documents.
    NOw im kinda lost and dont know what configuration i actually need to be configured in the Nexus switch.

    and this the config i have done only:
    1. feature fcoe
    2. slot1 : port 1-5 type ethernet and port 6-32 type FC.
    3. Saved the config and reloaded.

    after that i have found port 1/1-5 is ethernet and 1/6-32 is FC ports.

    Now i want to know i have to do complete a storage solution.

    PS: i have 3 sites, 3 nexus and 2 complent and 1 equologic . so , i have a rush now !!!!
    I would like to have some guide lines/tech support.
    NOte: cisco Smartnet is on the way !!! it will take 2/3 weeks to be available. but i need to up the site within 1 week.

    SO share me a config template if possible.


Leave a comment

vceplus-200-125    | boson-200-125    | training-cissp    | actualtests-cissp    | techexams-cissp    | gratisexams-300-075    | pearsonitcertification-210-260    | examsboost-210-260    | examsforall-210-260    | dumps4free-210-260    | reddit-210-260    | cisexams-352-001    | itexamfox-352-001    | passguaranteed-352-001    | passeasily-352-001    | freeccnastudyguide-200-120    | gocertify-200-120    | passcerty-200-120    | certifyguide-70-980    | dumpscollection-70-980    | examcollection-70-534    | cbtnuggets-210-065    | examfiles-400-051    | passitdump-400-051    | pearsonitcertification-70-462    | anderseide-70-347    | thomas-70-533    | research-1V0-605    | topix-102-400    | certdepot-EX200    | pearsonit-640-916    | itproguru-70-533    | reddit-100-105    | channel9-70-346    | anderseide-70-346    | theiia-IIA-CIA-PART3    | certificationHP-hp0-s41    | pearsonitcertification-640-916    | anderMicrosoft-70-534    | cathMicrosoft-70-462    | examcollection-cca-500    | techexams-gcih    | mslearn-70-346    | measureup-70-486    | pass4sure-hp0-s41    | iiba-640-916    | itsecurity-sscp    | cbtnuggets-300-320    | blogged-70-486    | pass4sure-IIA-CIA-PART1    | cbtnuggets-100-101    | developerhandbook-70-486    | lpicisco-101    | mylearn-1V0-605    | tomsitpro-cism    | gnosis-101    | channel9Mic-70-534    | ipass-IIA-CIA-PART1    | forcerts-70-417    | tests-sy0-401    | ipasstheciaexam-IIA-CIA-PART3    | mostcisco-300-135    | buildazure-70-533    | cloudera-cca-500    | pdf4cert-2v0-621    | f5cisco-101    | gocertify-1z0-062    | quora-640-916    | micrcosoft-70-480    | brain2pass-70-417    | examcompass-sy0-401    | global-EX200    | iassc-ICGB    | vceplus-300-115    | quizlet-810-403    | cbtnuggets-70-697    | educationOracle-1Z0-434    | channel9-70-534    | officialcerts-400-051    | examsboost-IIA-CIA-PART1    | networktut-300-135    | teststarter-300-206    | pluralsight-70-486    | coding-70-486    | freeccna-100-101    | digitaltut-300-101    | iiba-CBAP    | virtuallymikebrown-640-916    | isaca-cism    | whizlabs-pmp    | techexams-70-980    | ciscopress-300-115    | techtarget-cism    | pearsonitcertification-300-070    | testking-2v0-621    | isacaNew-cism    | simplilearn-pmi-rmp    | simplilearn-pmp    | educationOracle-1z0-809    | education-1z0-809    | teachertube-1Z0-434    | villanovau-CBAP    | quora-300-206    | certifyguide-300-208    | cbtnuggets-100-105    | flydumps-70-417    | gratisexams-1V0-605    | ituonline-1z0-062    | techexams-cas-002    | simplilearn-70-534    | pluralsight-70-697    | theiia-IIA-CIA-PART1    | itexamtips-400-051    | pearsonitcertification-EX200    | pluralsight-70-480    | learn-hp0-s42    | giac-gpen    | mindhub-102-400    | coursesmsu-CBAP    | examsforall-2v0-621    | developerhandbook-70-487    | root-EX200    | coderanch-1z0-809    | getfreedumps-1z0-062    | comptia-cas-002    | quora-1z0-809    | boson-300-135    | killtest-2v0-621    | learncia-IIA-CIA-PART3    | computer-gcih    | universitycloudera-cca-500    | itexamrun-70-410    | certificationHPv2-hp0-s41    | certskills-100-105    | skipitnow-70-417    | gocertify-sy0-401    | prep4sure-70-417    | simplilearn-cisa    |
http://www.pmsas.pr.gov.br/wp-content/    | http://www.pmsas.pr.gov.br/wp-content/    |